Thanks everyone for your kind words. We hope that this has been helpful!
What was the hosting company?
It’s one of the few hosting companies out there that accepts Bitcoins. We are trying to not put a negative spin on this post by passing blame around. We only want other developers to be aware of what recently happened to us, so they can better protect themselves.
With that being said, if anyone has recommendations for fast and reliable hosting companies that take Bitcoin, please let us know!
Congratz on the save.
Do you have any suspicions of who did this?
No idea who did this. Probably just some random guy that thought he could steal some Bitcoins.
Let me rearrange this so it is readable:
1. Hosting service uses software package "HostBill"
2. Hacker hacks that software and places an order for a remote access device to be installed.
3. A remote access device installed by ISP allows hacker to see the machine console and reboot
4. rebooting allows single-user mode, where files can be edited and a new user account or password inserted
5. hacker now has root, but the gaming platform is on encrypted media without a password the hacker knows.
You are lucky that the hacker couldn't think of anything interesting to do; however that machine is not 100% secure unless it can be image-restored or reloaded. An intrusion detection system would have alerted to any system changes or the downtime.
Thanks for the summary. Yes that is how it went down.
After we collected evidence, we trashed everything on the server and started fresh.
Do you have any recommendations for such an intrusion detection system? Anything that we can add to our servers to make them more secure would be great.
Something sounds very fishy here and it sounds like your hosting site has some major security flaws.1. How large is this datacenter, is it some mom and pop shop or is it a larger company? I ask this because when I walk into my datacenter I would have NO idea what each server in there does. Unless they have a big sign on your cage (next question), then how would this guy know you're a bitcoin casino? He would have to bypass the firewall, then the IPS to find out your servers real IP on the network and physical location
A) The hosting company is crooked and this is common there
B) An employee has gone rouge and has access to all the local infrastructure documentation, which would pin point DNS name/IP to your server location
C) The rouge employee has an outside man who he sells info too or is a cohort in the operation.
If it's a mom and pop shop I would do a security check and see what information they have on your server rack or cage.
2. Physical security: are your servers inside a lockable cage or do they have open physical access? What kind of KVM was installed: wired/wireless? If the servers are open, you need to pay a few more bitcoins to have it inside a cage or lockable rack. If the KV was wired did the wire lead too? If it was wireless, who has access and where can they access it? Based on the last question, is there video surveillance so you can see who was accessing the kvm/equipment?
A) Security physical lockable cage/rack if not done already
B) Do a security sweep and see if there are any physical weaknesses (holes, opening, etc..)
C) Verify video if they have any -- Verify kvm used and where it was used at
D) One of your own admins or someone who you know or admins know that has access to your physical location of the servers gave up knowledge.
Recommendations:
1. I would change hosting sites if all possible. Yeah they accept bitcoins, but what would of happened if they took all your coins? Just depends on what you're comfortable with.
2. Install an IP camera on your server/rack that takes video or pictures 24 hours a day. This will help ward off any physical access and also give you video evidence in case they do not have it.
3. Based on their remote hands/ticketing system, I would put a complete hold on all orders unless they have verbal communication from your or any of your trusted admins. If they do not allow this then LEAVE ASAP.
4. I would also look at your own admins and who ever knows any inside knowledge of your physical servers/passwords/logins.
I hope this helps, PM me if you have any more questions, this was a quick response.