• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Catalinx hack

yabado

Regular Pleskian
I recently noticed some strange email bounces coming back to my Plesk "test" server. It turns out that the server was hacked. After som investigation I found this site that explains what was compromised...

http://catalinx.org

Here is what it says...

--snip--
NOTICE, THIS DOMAIN WAS USED BY HACKERS FOR ROOTKIT EMAILS,
CHECK /etc/cron.daily/dnsquery,
/etc/cron.daily/distwatch,
/etc/init.d/killd,
/usr/lib/popauth,
/usr/share/misc/blah/ and
your local smtp server for emails to cata@catalinx.org or unul_catalin@yahoo.com


You can check your Linux server for rootkits with any or all of these programs: chkrootkit, rkhunter, unhide.
This Website is NOT RELATED with the hackers.
--snip--

What are some best practices for preventing such an attack in the future?
 
Back
Top