* * * * *

                       Not that bad, as these things go

Well, the server was hacked [1], but it looks to be a customer account was
compromised, since the executables where owned by a customer account, the
processes were running on unpriviledged ports, and the server was being used
as part of denial of service attacks, with executables hidden under a hidden
directory in /var/tmp.

Fortunately, the system hacked is running Linux without module support, so
patching system calls [2] to hide activity is impossible without a reboot
(which would be noticed).

And as always, it could have been worse [3].

[1] gopher://gopher.conman.org/0Phlog:2006/01/16.3
[2] http://lib.ru/SECURITY/linux_module_heroin.txt
[3] gopher://gopher.conman.org/0Phlog:2004/09/19.1

Email author at [email protected]