I'd posted about recently being hacked in a thread on texting-based customer support in the Moan Zone, and member Kpatz had the great suggestion to start a dedicated thread about member's experiences with being hacked, and mitigation / recovery strategies. I'm a product & web designer by trade, and dabble a bit with programming for my wife's company. I'm interested in technology and enjoy working with it / learning about it, but am not an expert in any way with networking or the inner-workings of computers. But I know a bit, and will start this thread with a discussion of what happened to me and how I'm trying to fix it. I'll follow-up when I have time with some photos I've taken over the course of the hack showing some of the footprints left by the attacker. I know there are a Microsoft employee or two who are frequent contributors in this forum, so hopefully they'll chime in with their expertise on suggestions for keeping our computers safe.
I have a remote Ubuntu server hosted on Linode where I keep my portfolio and web programming projects I occasionally do for my wife's company. I've been out of full-time work for the last five years caring for elderly parents, and when Covid hit I didn't access the server much if at all. It was a Ubuntu 16.04 server that had few if any updates applied during this time.
In February, I started working on a new project for my wife's company, so began updating the server and posting a PHP / MySQL / JavaScript-based project that my wife's employees could access. I immediately began noticing strange behavior on the server: text typed in my shell was very laggy; connections kept breaking (especially when modifying configuration files); etc. Rather than fight with the server, I decided it was time to start fresh and I wiped the old server and started with new virtual disks and a new Ubuntu 20.04 server.
A day or two later (March 9) I logged onto the server just before going to bed to FTP some changes to the project when I made a fateful mistake: I clicked through an SSH (secure shell) prompt that my server's keys had changed: a classic man-in-the-middle attack. I immediately knew I'd made a mistake, but wasn't too worried about it because I was using a Yubikey for two-factor authentication on the server. I mistakenly thought that would protect me.
I knew something was seriously wrong the next morning when I logged back on and wasn't prompted to touch my Yubikey to authenticate. Investigation revealed that the attacker had deleted all the configuration files associated with the Yubikey.
I spent the next week trying to reclaim my server, while blithely ignoring that the attacker might also have infiltrated our home network. In my next post, I'll talk about what I observed when I realized nefarious activities were also afoot at home ...