Tyrael — audit

2026-05-02T11:31+00:00 · audit #1 · 351s · history

Here's the 24h audit. Times are EEST (UTC+3) unless noted. Host IDs: ist=49, jah=144, sur=161, cham=162.


1. New IP 5.2.230.242 got root-equivalent access on TWO hosts within 24h. This is the only finding that actually needs a yes/no from you tonight.

2. Cross-host SSH config drift: ist and jah permit root password SSH; sur does not. cham SSH posture unverified.

3. Same IP family probed /webshell on three customer sites ~7h before the cPanel jiva login — coincidence flag, not proof.

4. NWS's own service@nws.ro is being spoofed in spam runs. Mail server rejected them — still tells us the domain is in spam circulation.

5. No new cPanel/WHM account creations, no Imunify malware detections, no SSH brute-force IP that succeeded other than 5.2.230.242.

6. Two hosts report packages installed in the last 24h — Zabbix flag, no further detail in our pipeline.


Bottom line for your time: finding #1 is the only thing where a wrong answer matters. If 5.2.230.242 is you, everything below it is hygiene (#2 fix the drift, #6 confirm the package change). If it isn't you, drop everything and start with rotating ist root + cham WHM root + jiva cPanel passwords.