Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Ransomware infected pfSense

    Scheduled Pinned Locked Moved General pfSense Questions
    20 Posts 14 Posters 6.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kpa
      last edited by

      Running an old and unsupported version despite of the numerous warnings is always a very bad idea.

      1 Reply Last reply Reply Quote 0
      • BBcan177B
        BBcan177 Moderator
        last edited by

        By any chance did you run Samba on this box?

        "Experience is something you don't get until just after you need it."

        Website: http://pfBlockerNG.com
        Twitter: @BBcan177  #pfBlockerNG
        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

        1 Reply Last reply Reply Quote 0
        • dennypageD
          dennypage
          last edited by

          I would very much like to know the entire list of packages installed on the box. Also, what if any access from the WAN was allowed.

          1 Reply Last reply Reply Quote 0
          • N
            NOYB
            last edited by

            Hmmm,  You're able to access 'cat' and '/etc/motd'.  What is being held for ransom?

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              Well according to that its a scam ransomware and nothing is encrypted, just deleted..  Yeah if you leave your ssh open to the public and or webgui and just have basic passwords as security sure I could bruteforce in and then do whatever..

              Let me guess a remote site when you say customer, so ssh open - not even locked down to public key auth only?  Or worse yet web gui open to the public, etc.

              Your warning is good advice on why you don't leave access to your stuff open to the public internet ;)  No matter how easy you think it makes it for you to admin..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • jimpJ
                jimp Rebel Alliance Developer Netgate
                last edited by

                When you rebuild it, be sure to close whatever hole was left open that allowed them in. Whether it was wide-open ssh/GUI access, accounts with weak passwords, or other common security fumbles.

                Without more info it's impossible to say what might have happened, but either an add-on package with weak security or accounts with default or weak passwords exposed to attackers would be safe bets. The attacker could be on the local network if someone local was infected, but a default or weak password would still have exposed the firewall to it.

                So make sure to not only close off access to ports on the firewall from WAN (which are closed by default) but also from local interfaces except for approved management hosts/networks. Make sure not to leave any account passwords at their default – especially root/admin. And if you had anything like samba or other packages that were not from pfSense originally installed on the firewall, don't put those back.

                Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                Need help fast? Netgate Global Support!

                Do not Chat/PM for help!

                1 Reply Last reply Reply Quote 0
                • ?
                  A Former User
                  last edited by

                  Hello on the theme of ransomware variants can be locky or zepto, this eliminates the information but before makes an encrypted copy the user data; I have seen this in many of my clients but esteos attacks were made by email when a spammer sends in the mail a URL or attachment javascript theme, executed see ua connection that directs you to a tor server and which opens download ransomware, encryption keys can be RSA or AES; that is where the hacker leaves a part of the key to decipher and ask for a payment to give the other party, which is a trick for theft, the technique only is prevention because so far antiviral engines are not ransomeware detecting these variants, there are some herraientas recovery but only for older versions.

                  1 Reply Last reply Reply Quote 0
                  • KOMK
                    KOM
                    last edited by

                    Gotta love this guy.  Shows up, claims his pfSense box got own by ransomware, and then disappears into thin air.

                    1 Reply Last reply Reply Quote 0
                    • B
                      brkaus
                      last edited by

                      @KOM:

                      Gotta love this guy.  Shows up, claims his pfSense box got own by ransomware, and then disappears into thin air.

                      Possibly embarrassed that the ssh password was "password"

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator
                        last edited by

                        Maybe he just on vac?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                        1 Reply Last reply Reply Quote 0
                        • M
                          MadelineDickson63gmail.c
                          last edited by

                          Another ransomware - http://soft2secure.com/knowledgebase/odin-file-virus
                          Most ransomware come with email attachments and rogue links - do not click anything suspecious

                          1 Reply Last reply Reply Quote 0
                          • H
                            Harvy66
                            last edited by

                            BritneySpears_Naked.exe!!! OMG! I must click the email attachment!

                            1 Reply Last reply Reply Quote 0
                            • jimpJ
                              jimp Rebel Alliance Developer Netgate
                              last edited by

                              @Harvy66:

                              BritneySpears_Naked.exe!!! OMG! I must click the email attachment!

                              While also opening the Anna Kournikova equivalent, for good measure.

                              Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                              Need help fast? Netgate Global Support!

                              Do not Chat/PM for help!

                              1 Reply Last reply Reply Quote 0
                              • K
                                Koman
                                last edited by

                                I think that the main cause of ransomware infection is between LCD and chair  ;D
                                As I know the only way to decrypt locked files including this new Odin (http://myspybot.com/odin-virus/) is to use shadow copies extract tools like ShadowExplorer (http://www.shadowexplorer.com/downloads.html) or similar.
                                But the best option is to have backups of all your important data in separate hard drive/usb drive/cloud.

                                1 Reply Last reply Reply Quote 0
                                • KOMK
                                  KOM
                                  last edited by

                                  But the best option is to have backups of all your important data in separate hard drive/usb drive/cloud.

                                  This has been the best advice for a plethora of computer issues going back 35+ years, but it still seems like everyone has to learn it the hard way.

                                  1 Reply Last reply Reply Quote 0
                                  • jimpJ
                                    jimp Rebel Alliance Developer Netgate
                                    last edited by

                                    And another offline copy in a locked safe off-site.

                                    Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                    Need help fast? Netgate Global Support!

                                    Do not Chat/PM for help!

                                    1 Reply Last reply Reply Quote 0
                                    • C
                                      chris4916
                                      last edited by

                                      All of this being said, and obviously I do share  ;), there is something to be noticed: with default set-up, meaning not access allowed from outside, pfSense doesn't offer, as far as I understand, anything against brute force attack from the LAN.

                                      Sure one can set-up FW rules to limit this, build VLAN, use strong admin password but if one device on the LAN side get infected by piece of code executing brute force attack against your default gateway, how do you notice and prevent it?

                                      From WAN, this is quite simple… and furthermore covered by default set-up
                                      From LAN, this is another story and perhaps some mechanism "a la fail2ban" may help on the internal side.

                                      Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

                                      1 Reply Last reply Reply Quote 0
                                      • jimpJ
                                        jimp Rebel Alliance Developer Netgate
                                        last edited by

                                        We already have it. 15 denied logins via GUI or SSH gets your IP banned for an hour, even local.

                                        Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                                        Need help fast? Netgate Global Support!

                                        Do not Chat/PM for help!

                                        1 Reply Last reply Reply Quote 0
                                        • C
                                          chris4916
                                          last edited by

                                          Cool, this is what I didn't know. Excellent, thank you.
                                          and most likely enough to fight brute force if your admin paswword is not "password" or "admin"  ;D ;D ;D

                                          Jah Olela Wembo: Les mots se muent en maux quand ils indisposent, agressent ou blessent.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.