大约 3-4 台服务器被发现中了,现在把这些文件彻底删除了,修改了电脑账号的密码,不知道这样子是不是就安全了……
{
"algo": "cryptonight", // cryptonight (default) or cryptonight-lite
"av": 0, // algorithm variation, 0 auto select
"background": false, // true to run the miner in the background
"colors": true, // false to disable colored output
"cpu-affinity": null, // set process affinity to CPU core(s), mask "0x3" for cores 0 and 1
"cpu-priority": null, // set process priority (0 idle, 2 normal to 5 highest)
"donate-level": 5, // donate level, mininum 1%
"log-file": null, // log all output to a file, example: "c:/some/path/xmrig.log"
"max-cpu-usage": 100, // maximum CPU usage for automatic mode, usually limiting factor is CPU cache not this option.
"print-time": 60, // print hashrate report every N seconds
"retries": 5, // number of times to retry before switch to backup server
"retry-pause": 5, // time to pause between retries
"safe": false, // true to safe adjust threads and av settings for current CPU
"threads": null, // number of miner threads
"pools": [
{
"url": "pool.supportxmr.com:5555", // URL of mining server
"user": "43YVXSRrqzejHN1UNmQ9gtRhmRJQn472pbXoqmtsBeGZBf7w5eNXUVsWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3x4ZNk7", // username for mining server
"pass": "x", // password for mining server
"keepalive": true, // send keepalived for prevent timeout (need pool support)
"nicehash": false, // enable nicehash/xmrig-proxy support
"variant": -1 // algorithm PoW variant
}
],
"api": {
"port": 0, // port for the miner API https://github.com/xmrig/xmrig/wiki/API
"access-token": null, // access token for API
"worker-id": null // custom worker-id for API
}
}
1
wangfei324017 OP 图片
|
2
crab 2018-07-04 16:45:47 +08:00 1
只改密码治标不治本啊(除非确定是因为密码被破解)
找出被入侵的原因吧。(建议是系统重装,而不是只改密码。) |
3
sphawkcn 2018-07-04 17:14:48 +08:00
既然是服务器,那就不要用密码了,用密钥吧。
|
4
wangfei324017 OP @sphawkcn windows 服务器也可以用密钥嘛……
|
5
wangfei324017 OP @crab 3q
|
6
Heyuan 2019-08-28 14:55:06 +08:00
请问解决了吗,我重装系统还是会有这个矿木马
|
7
wangfei324017 OP @Heyuan #6 我好像把他删了就好了
|