AWS Abuse Email

0

We've received a report(s) that your AWS resource(s) has been implicated in activity which resembles attempts to access remote hosts on the internet without authorization. Activity of this nature is forbidden in the AWS Acceptable Use Policy (https://aws.amazon.com/aup/). We've included the original report below for your review.

**---Beginning of forwarded report(s)--- **

  • Log Extract: <<< From: Time: Mar 23 21:02:32 Message: AAA user authentication Rejected : reason = User was not found : local database : user = james : user IP = Source IP (Server IP)

Continuously To until I blocked the IP ranges: Time: Mar 23 21:12:50 Message: AAA user authentication Rejected : reason = User was not found : local database : user = james : user IP = Source IP (Server IP)

Source IP xxxxx Destination IP 209.34.142.141 UDP port 500 Time: Mar 23 21:02:32 PT And several minutes prior.


I have searched Security Group inbound rules and my servers setting but haven't located UDP port 500. Source IP is our server's but not destination IP. Can anyone help me solve this matter.

2 個答案
0
已接受的答案

Hi

This is outgoing connection from your server, so you need to look on your servers and check there. Port 500/UDP looks like some scanning from your side for IPSec connection. If you not sure, please maybe collect Flow logs and check which server/device that you manage on AWS is trying to make this connection. By default all outgoing connection from servers to Internet are open by SG or NACL, maybe it's worth to do some hardening there? Many people focus on incoming connection to be secure, but also important is what do we allow as outgoing connection.

Thanks,

profile picture
已回答 1 個月前
profile picture
專家
已審閱 1 個月前
  • Thanks for the reply, I will look for outgoing connection on my server. Its our cPanel instance on AWS.

  • It is possible that someone is exploiting a vulnerability in cPanel or code uploaded via cPanel.

  • Yes, our Linux server is infected with {MD5}PHP.Spammer.cookie_email_send_id_gen_md5_4640, {SA-MD5}PHP.Backdoor.orvxshell_v2, {SA-SNIPPET} PHP.Backdoor.wpincl, and {SA-MD5}PHP.Backdoor.FXTHRHqgMI. Our security plugin removes it but it comes back

  • Thanks for solving our issue

0

In addition to what Marcin has said, please engage with that e-mail that you have received. You need to actively reply to the email and indicate that you are looking into the issue, else they may take steps to isolate your account under the AUP violation.

AWS
專家
已回答 1 個月前
profile picture
專家
已審閱 1 個月前
  • We have replied to that email and closed all the outgoing connections.

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南