Many of you are aware of SSHD exploit going around hosting comunity. It seems to affect servers running CloudLinux, CentOS & cPanel.
There are also reports of DirectAdmin, Plesk & non-RHEL based distributions being affected.
Detailed discussion can be found here:
We believe the exploit is done via SSH server.
So far we know:
- Rootkit deposits files /lib64/libkeyutils.so.1.9 on 64bit systems and /lib/libkeyutils.so.1.9 on 32bit systems
- It changes link: /lib64/libkeyutils.so.1 (and /lib/libkeyutils.so.1) to point to that library.
- stealing passwords, ssh keys & /etc/shadow from the system
- used as a backdoor to access server at any time
- send spam
We have noticed that once cleaned up, servers often get re-infected.
You can see if your server is infected by running:
$ wget -qq -O - |/bin/bash
To clean up libkeyutils library.
USE IT AT YOUR OWN RISK, THE SCRIPT WASN'T FULLY TESTED
$ wget -qq -O - |/bin/bash
and reboot the server.
To protect against being re-infected again we recommend completely firewalling SSH from internet, allowing access only from your IP. Change your passwords for SSH, WHM and any other admin passwords you are using on that server.

any news about this?
What caused it, how, how to be protect (except the firewall option), or how to permanent fix/clean it?
I saw WHT forums and cPanel forums are on fire...
Can't even follow them
And with comments like that:
Well doesn't it figure....
I install a fresh copy of CentOS 6.3 with cPanel current and in less than 2 hours.... BAM
We will update everyone as we have more info.
The RedHat Publiced this Bug PACH for RHL Linux in 21 feb :
Have you ever made a patch for this bug ?
Yet, the patch & vulnerability has no relationship to this SSH Rootkit.
Are you still seeing new servers being hacked or is this concidered over ?