Mobile app version of vmapp.org
Login or Join
Sent6035632

: AWS EBS Tomcat instance being hacked I'm using AWS EBS instances with tomcat for my java web application. But somehow some guy manages to hack into my instances and all I can see are these

@Sent6035632

Posted in: #AmazonAws #Security #Tomcat

I'm using AWS EBS instances with tomcat for my java web application. But somehow some guy manages to hack into my instances and all I can see are these processes being ran by tomcat:

tomcat 26988 0.2 0.1 180304 2972 ? S 11:18 0:00 wget 220.133.87.149:49120/breeb tomcat 1898 0.0 0.0 75252 736 ? Ssl 11:18 0:00 ./breeb


These process send out lots of random packets (in TBs) within minutes. The IP(http://220.133.87.149:49120/) from where these malicious files are being downloaded contains many other malicious files.


Does anyone have any idea, what am I dealing with? Below are my security settings for AWS instances:

Inbound:

80 tcp 0.0.0.0/0
22 tcp 0.0.0.0/0


Outbound:

All traffic All Protocol All IPs

10.01% popularity Vote Up Vote Down


Login to follow query

More posts by @Sent6035632

1 Comments

Sorted by latest first Latest Oldest Best

 

@Gail5422790

* THREAD TAKEN TO AWS FORUMS *
forums.aws.amazon.com/thread.jspa?threadID=227061&tstart=0
* THREAD TAKEN TO AWS FORUMS *



I had the same problem last week:

My amazon server was somehow compromised. I received an abuse report from amazon stating my server was being used in a DDOS attack on a website.

When I logged in I found an application /usr/share/tomcat7/breeb was running in memory. I expect there is a weakness in tomcat 7 which means a remote user is able to upload a spam client to my server and execute it as the tomcat user. Very worrying.

Looks to me like the ‘breeb’ application is written in c++ and has the following footprint

-rwxrwxrwx 1 tomcat tomcat 1223123 Nov 7 23:54 breeb
-rw-r--r-- 1 tomcat tomcat 1223123 Nov 7 23:54 breeb.1
-rw-r--r-- 1 tomcat tomcat 1223123 Nov 7 23:54 breeb.2
-rw-r--r-- 1 tomcat tomcat 1223123 Nov 7 23:54 breeb.3


Some of the c++ classes are a bit of a giveaway:

[ec2-user tmp]$ strings breeb | grep .cpp
AmpResource.cpp
Attack.cpp
CmdMsg.cpp
ConfigDoing.cpp
DNSCache.cpp
ExChange.cpp
Global.cpp
Main.cpp
ThreadDoFun.cpp
...


Googling "linux backdoor 1223123" which is the bytesize of the spam client, brings up a lot of virus alerts.

Other ‘strings’ in the compiled breeb application include a large list of IP addresses, they are all Chinese and feature in a lot of malware reports.

Cant seem to get any recognition of this issue on any of the forums, I've since rebuilt the server but with tomcat8 and been running for a few days without problems... Would be nice to know what the attack vector was.

10% popularity Vote Up Vote Down


Back to top | Use Dark Theme