!PBGPGQSTRBkZCwpLOI:matrix.org

uiuclug

83 Members
UIUC Linux Users Group - lug.acm.illinois.edu7 Servers

Load older messages


SenderMessageTime
10 Apr 2024
@Evidlo:matrix.orgevidlowatch your machine with wireshark and figure out if your machine is actually sending emails or not04:48:01
@Evidlo:matrix.orgevidloand you should always wipe your machine if you think its compromised04:49:46
@_discord_415911149771685891:t2bot.iofabu.io might be better to just wipe ubuntu and install fedora 05:06:06
@_discord_415911149771685891:t2bot.iofabu.io but i am curious as to how it happened 05:06:17
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen it could be a compromised snap / container or python package or nodejs package... lots of fake stuff out there. Did you ask campus security for more details, like specific traffic or email addresses your host is sending to? I hope its not just root emails going to someplace unintended to some odd default or DNS lookup or something like that. 13:50:24
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen I would try and get details on when exactly the email activity started and try and trace what you were doing around then. Can also check your system logs. I would assume that Ubuntu logs emails that it sends by default, assuming the local MTA was used and not direct network connections to mail servers. 14:05:49
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen If you want to make an image of your system I'd be happy to investigate using our forensics tools. (I perform forensics as part of my incident response activites at NCSA.) Or you can try and run https://github.com/sleuthkit/autopsy yourself on an image taken prior to reinstall. See https://github.com/sleuthkit/autopsy/blob/develop/Running_Linux_OSX.md 14:10:45
@_discord_415911149771685891:t2bot.iofabu.io I did, but the people on desk were unable to give me any specific details 16:52:23
@_discord_415911149771685891:t2bot.iofabu.io and since I need to connect to IllinoisNet for part of my research, I need to deal with this asap 16:52:50
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen If it were me, I'd pull the current SSD / hard drive and reinstall onto a new one to keep working. can always put the original back to do any forensics 17:55:22
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen (this of course assumes you have another drive you can use) 17:56:19
@jos44:matrix.orgJosRedacted or Malformed Event17:57:51
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen I've had some no good experiences with campus security alerting on stupid hits, like people typoing web sites (yahooo for example) and this triggering something in their next gen firewall that really isn't a big deal and them creating a ticket. 17:58:09
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen In my case I could argue against them since I am an IT Pro on campus - not sure students have much they can do here... 17:58:40
@Evidlo:matrix.orgevidloget them to change their stance on SSH exceptions please17:59:10
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen can you point me to more details on what you mean? 18:01:04
@pngdeity:matrix.org@pngdeity:matrix.org
In reply to @jos44:matrix.org
hello, online jitsi meetings stopped?
We don't always set up Jitsi for meetings, no. Typically if someone is planning on watching remotely, they will send a message to this chat, and the Jitsi meeting will get set up.
18:03:37
@jos44:matrix.orgJosRedacted or Malformed Event18:04:17
@jos44:matrix.orgJosRedacted or Malformed Event18:05:25
@Evidlo:matrix.orgevidlo cclausen: https://answers.uillinois.edu/illinois/page.php?id=74159 18:06:23
@Evidlo:matrix.orgevidlo I applied, waited 6 weeks with a bit of back and forth, then got rejected and told to "just use the VPN". 18:07:04
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen hmm... yeah, that I'm not much a fan of their VPN 18:07:26
@Evidlo:matrix.orgevidloof course they don't scrutinize other vulnerable services nearly as much, like outdated Wordpress or something. and its possible to make sshd listen on other ports18:09:03
@Evidlo:matrix.orgevidlo* of course they don't scrutinize other vulnerable services nearly as much, like outdated Wordpress or something. and its possible to make sshd listen on other ports so the whole thing is moot18:09:39
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen their Qualys scans should pick up outdated Wordpress 18:11:35
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen yeah, was going to ask if you could just have SSH listen on 443 or 80 18:11:47
@uphead:hosi.coCosinedo they just block port 22 or use some sort of DPI to detect SSH activities?18:15:36
@_discord_415911149771685891:t2bot.iofabu.io ya :( 18:28:07
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen technically SSH could be detected via Zeek/Bro that is run for campus network traffic 19:15:28
@_slack_acm-uiuc_U72KQT7RT:matrix.orgcclausen not saying that they would use those logs to detect and then block, but they could. My guess is that the SSH block is just a port 22/tcp firewall block at the campus border 19:16:10

Show newer messages


Back to Room ListRoom Version: 1