Jump to content
Sign in to follow this  
smokey0159

read this new hack stealing database and rcon passwords

Recommended Posts

this letter was from a vilayer server i have

Hello michael,

We detected a major Arma2 exploit that required immediate attention.

The exploit allowed malicious users to gain access to your configuration files such as HiveExt.ini or Battleye Config etc... thus creating a major security issue within the engine.

We already had a secure infrastructure that was unique to Vilayer and this hack/exploit out for DayZ would not affect Vilayer servers however recently we have detected a new hack that has been built for both normal running servers and Vilayer servers.

This exploit is for all Arma2 servers not just Vilayers Arma2 servers and we are informing Bohemia Interactive about this issue.

The exploit works in the following way,

On the hack menu in question the users have the option to retrieve Rcon password.

This function then scans the Vilayer#MapName#Custom/BattlEye directory for beserver_active_#id#.cfg

Of which when this function finds the file in question it's then able to pull the Rcon password which allows them access to your server.

This function is able to grab any files and pull variables within the same method thus making is a major security issue.

We have also had reports from customers and other users within the Arma2 community that certain people using this hack are stating that you need to USE THERE ANTIHACK to prevent this from happening, then they are charging for their antihack product which really prevents nothing.

So once and for all we have developed a system that should prevent all of this from happening full stop.

Everytime your server starts a new randomized directory is created, you will notice this happens automatically on your service and you do not need to apply anything for these changes to be made.

This prevents the malicious users from accessing your configuration files because the directory of which your configuration files are located is randomised and is changed every time your server restarts.

This will stop the hack/exploit method as they can-not scan your configuration files and should stop the exploit.

As always we do our very best to keep your services secure however this update may have created a rare issue within your installation of DayZPackage.

The issue occurred when your files were in use when the update was released and an error on our side caused corruption within your directory structure. The good thing is only small number of services were affected by this issue and an immediate fix was released preventing it from happening to anyone else.

IF YOU SERVER HAS BEEN AFFECTED BY THIS ISSUE, WE ALREADY KNOW ABOUT IT AND YOU WILL BE NOTIFIED BY OUR SUPPORT DEPARTMENT PROMPTLY.

ALL USERS AFFECTED WILL BE OFFERED TWO FREE WEEK OR AN ADDITIONAL UPGRADE OF SERVICE.

We are extremely sorry for and inconvenience this may have caused and will do our very best to restore services asap.

-------------------------------------------------------------------------------------

We do suggest making an immediate password change of both your database users and your rcon password just in case users using this hack have saved your details.

To make the changes please perform the following tasks.

CHANGING DATABASE PASSWORDS

Step 1. LOGIN TO ACP

Step 2. GOTO YOUR SERVICE

Step 3. PRESS CHANGE DATABASE PASSWORDS

Step 4. EDIT PASSWORDS ONLY TO YOUR PREFERENCE

Step 5. PRESS EXECUTE ON THE TOP LEFT AND WAIT FOR PROCESS TO FINISH.

CHANGING RCON PASSWORDS

Step 1. LOGIN TO ACP

Step 2. GOTO YOUR SERVICE

Step 3. PRESS RESET RCON PASSWORD

Step 4. EDIT RCON PASSWORD TO YOUR PREFERENCE

Step 5. PRESS EXECUTE ON THE TOP LEFT AND WAIT FOR PROCESS TO FINISH.

Once you have performed both tasks you should be safe from this exploit.

-------------------------------------------------------------------------------------

If you have any questions please open a support ticket or contact us via normal methods of support.

Share this post


Link to post
Share on other sites

This isn't new unfortunately :( It was used to attack dayz.st servers many months back, they have now fixed it.

Vilayer should really of patched this BEFORE it was being used to attack their customers.

Share this post


Link to post
Share on other sites

.

Edited by ebay

Share this post


Link to post
Share on other sites

this isnt the same ones from month ago this is a new script they have not the old a new one vilayer sorted thers out last time way before days.st did as im with both server providers and remember when dayz.st got hit like they do all the time this is a total new system that is happening to all server providers

Share this post


Link to post
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×