When I ssh’ed into two of my accounts on ‘powerofdifference.org’, I saw
Last login: Sat Jan 11 01:22:17 2020 from 50.108.193.47 and this Last login: Sun Jan 12 17:05:12 2020 from 50.108.193.47
Any chance this is from D.O. maintainence? Do you recognize these IP addresses? Is there any way I can tell which authentication mechanism they have accessed? IE, have they broken my passwords? Have they broken in through SSH attacks?
whois 50.108.193.47 is located in Downsville, NY 13755.
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
The IP 50.108.193.47 doesn’t seem to be one of DigitalOcean’s ranges. Additionally personnel from DigitalOcean will not access your droplet.
As to the methods they’ve used, firstly, confirm what methods of authentication you have. DigitalOcean’s droplets come with enabled only PublicKey authentication however if you’ve enabled your password authentication as well, most likely that was the way they access your droplet.
Additionally, it’s possible the attackers used an exploit on one of your service .
Now, there is no way to know the exact damage they have caused so I’ll recommend the following :
If you have a backup of the droplet, revert to it and update everything. If you have any outdated service like PHP,Nginx,MySQL and so on, update them to the latest one.
If you don’t have a backup, you’ll need to built a new droplet. There is no other way around it. Having said that before you put your website/application on your new droplet, make sure to check your website if anything has been put there as a backdoor. Once you are sure there hasn’t you can go ahead and migrate it to your new droplet.
As to check how was your droplet accessed, you can search your /var/log/messages and /var/log/secure. The information is contained there. Unless it has been removed by the people that got access to your droplet.
Regards, KDSys
Hi there,
You can install malware detection software like Linux Malware Detect, also known as Maldet or LMD. It will help you to locate any malicious files on your droplet.
If you’re interested in securing your droplet (everyone should be in general) you can double-check our tutorial - An Introduction to Securing your Linux VPS.
The article will cover the basic and some more advanced steps in website and server security.
You can check the article here:
https://www.digitalocean.com/community/tutorials/an-introduction-to-securing-your-linux-vps
Hope that this helps!
Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.
Full documentation for every DigitalOcean product.
The Wave has everything you need to know about building a business, from raising funding to marketing your product.
Stay up to date by signing up for DigitalOcean’s Infrastructure as a Newsletter.
New accounts only. By submitting your email you agree to our Privacy Policy
Scale up as you grow — whether you're running one virtual machine or ten thousand.
Sign up and get $200 in credit for your first 60 days with DigitalOcean.*
*This promotional offer applies to new accounts only.