On 8/25/2018 12:59 PM, humanitarian wrote:
I am struggling to fight an attack were the solr user is being used to
crate files used for mining cryptocurrencies. The files are being
created in the /var/tmp and /tmp folders.
It will use 100% of the CPU.
I am looking for help in stopping these attacks.
All files are created under the solr user.
At least some of what I'm writing is a repeat of what was said in
SOLR-12700 -- an issue in Jira with a description that's extremely
similar to the subject of this message.
The Solr server should never be exposed to untrusted parties, especially
the open Internet. This is probably our number one recommendation for
security. If an attacker cannot reach a server, they cannot compromise it.
There are a lot of possible vectors in Solr that could have been used to
compromise the system. Most of the vulnerabilities that have been found
are in third-party dependencies that Solr utilizes to create certain
functionality.
This is not the first time I've encountered this. On at least one other
occasion, a user found weird software on their system running as the
solr user. It turned out to be a crypto-mining program.
If you have Solr logs from when your system was compromised, we can
check them to see if there's anything useful. There may not be anything
useful. One of the better logs for tracking this sort of thing is the
Jetty request log, but this log is not enabled by default in the Solr
download. This log will be the only way you can get the IP address
making requests.
Lock down your Solr server(s) so that only trusted network addresses can
reach them. This will need to be done outside of Solr. The operating
system will have a firewall available, and your network equipment might
also have filtering capability.
Thanks,
Shawn