Yeah, it sounds like ransom ware but usually that comes with a ransom demand. Well, at least a semi competent axehole crook would figure out the order of the exploit execution.
Itâs just strange that searches donât turn anything up. Maybe the extensions are randomized somehow to try and cover tracks? I know I saw a machine try domain after domain trying to phone home once. Most of the domains were random gibberish. One actually announced âransomwareâ in the DNS request.
For sure it is not related to the phone. This morning I saw that all sites return 404 and when I checked I saw that all files have that extension and cant be loaded as php files.
The first idea was just to remove the extension, but I saw that the content of the files is somehow coded.
Thatâs an extremely important distinction. If system files are affected in any way, then you know the system has been rooted and has to be reinstalled from scratch. You can never again trust a system that has been rooted.
But, if itâs just one user, then it may just be that one web app thatâs exploited. In which case, restoring a known good backup for that one user/domain may be sufficient, as long as you figure out what was exploitable in the old website and fix it (maybe a web app update, or if itâs custom codeâŠwell, youâre own your own if itâs custom code).
I wonder which version they were using - it has had some problems recently particular to npm vulnerabilities - another reason why updating and monitoring old systems is important.
@ivanovkbg - thats ransomware - cut all noise and save your time - rebuild your server from scratch and if you used some cms like wordpress or presta or opencard etc, install only latest versions, also ssh only via ssh keys no password. There is no reason you should spend any more time or energy to decrypt the files - even decripted its no use as someone had find way in - remove the files and db too. I am sorry but - Good luck.
psaux = rasnsomware - its been on google long time.