zlacker

[return to "I got hacked: My Hetzner server started mining Monero"]
1. marwam+um[view] [source] 2025-12-17 23:18:39
>>jakels+(OP)
Hahaha OP could be in deep trouble depending on what types of creds/data they had in that container. I had replied to a child comment but I figure best to reply to OP.

From the root container, depending on volume mounts and capabilities granted to the container, they would enumerate the host directories and find the names of common scripts and then overwrite one such script. Or to be even sneakier, they can append their malicious code to an existing script in the host filesystem. Now each time you run your script, their code piggybacks.

OTOH if I had written such a script for linux I'd be looking to grab the contents of $(hist) $(env) $(cat /etc/{group,passwd})... then enumerate /usr/bin/ /usr/local/bin/ and the XDG_{CACHE,CONFIG} dirs - some plaintext credentials are usually here. The $HOME/.{aws,docker,claude,ssh} Basically the attacker just needs to know their way around your OS. The script enumerating these directories is the 0777 script they were able to write from inside the root access container.

◧◩
2. jakels+jp[view] [source] 2025-12-17 23:40:23
>>marwam+um
Nothing in that container luckily, just what Umami needed to run, so no creds at all. Thanks for the info though!
[go to top]