I have a server on AWS, GuardDuty started send me notifications:
*** "type":"Backdoor:EC2/C&CActivity.B!DNS",
*** {"domain":"libcurl.so","protocol":"UDP","blocked":false}
*** is querying a domain name associated with a known Command & Control server. ***
I've checked the server with all possible security tools and nothing found.
With tcpdump -A I saw that my server send such kind of request about this domain.
I have turned on auditd. But nothing strange was found.
My question is, how to determine, which process exactly send this request?
auditdwill work - it's already a lost cause. Read how do I deal with a compromised server? - but first, shut the server off so it stops attacking people. – ceejayoz Oct 12 '18 at 13:22sshdif port 22 is open andUseDNS=yes, which is the default on many Linux images. In this case any ssh scanner from a suspicious domain will trigger theBackdoor:EC2/C&CActivity.B!DNSfinding. – Wolfgang Kuehn Aug 28 '21 at 20:28