Unexpected Login Attempts on Ubuntu Web Server – Need Help!

0
12
Asked By CuriousCactus77 On

Hey everyone! I'm looking for some insights into a strange situation with one of our domain machines. It seems to be making unauthorized login attempts to an Ubuntu web server that we have. This Ubuntu server briefly went down, but it shouldn't be receiving any logins, especially not using our highest privileged login, which many contractors and insiders are aware of. I heard from a contractor that the system's tied to various processes on our domain, and changing it would break a lot of things, but I'm not sure how true that is since I can't verify it.

I found some logs indicating that the firewall is blocking traffic from the suspected device to the server. The UFW logs show that outbound traffic is being blocked, which suggests unsolicited attempts. It's worth noting that after we removed DHCP leases, these devices continued to try to connect.

Interestingly, there's no one physically using this machine, and it's been vacant for three months. Yet, I spotted over 5,000 successful logins in the Event Viewer since the end of May, which the contractor said is normal. Also, there's a scheduled task on the machine that runs **C:windowsExplorer.exe** with some odd parameters, which I haven't seen on other machines. I haven't mentioned this to my contractor yet, since I'm a bit suspicious of previous claims they made regarding other processes.

Given that no one is using this empty desk and anyone with the super remote password can access the machine, I'm concerned about what's happening. I'm relatively new to system administration (about a year in), so I appreciate any help you can offer! Thanks for your time!

4 Answers

Answered By TechieTom42 On

You should definitely try unplugging the network cable from that machine. It’s a common method called a ‘scream test’—if someone complains about it, you’ll know it’s actively being used! Just make sure the machine stays powered on when you do this.

NerdyNina99 -

I saw a video about that on Instagram, it's a cool technique! Definitely worth a shot.

Answered By InfoHunter12 On

For what it’s worth, your question definitely seems like one for tech support or sysadmin discussions. You might get more specific advice on those types of forums!

SysAdminSavant -

You could try posting on r/sysadmin as well, they have some knowledgeable folks there!

Answered By SecuritySleuth88 On

It's a good idea to start migrating those processes to separate admin accounts. That way, if you change one password, it won’t cause a chain reaction of issues across your systems. It's all about isolating the access to reduce risks!

Answered By NetworkNinja33 On

You mentioned UFW blocking traffic and you're seeing some logins—have you checked the actual log files and protocols? You might be looking at multicast traffic like mDNS, which is harmless. Start tracing the MAC address through your network to get more clarity on this rogue device.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.