Tyrael — audit

2026-05-03T12:07+00:00 · audit #40 · 441s · history

NRG cPanel fleet — last 24h

1. Need a yes/no: was that you on root@sur+cham+ist last night at 23:42–23:45 EEST? Source IP 82.76.239.154 (Romanian, no failed_login history in 7 days, first seen 2026‑05‑01) authenticated as root via password on three boxes back‑to‑back:

2. Spoofed‑sender reconnaissance against ecnfg.com using NWS hostnames as the From IP 129.121.89.126 (Microsoft Azure US) tried 3 deliveries, walking through our cluster:

3. Reputation attack on nemesis.ro (NWS‑owned domain) at cham.nws.ro Two distinct sources spoofing nemesis.ro From: addresses, all blocked by HELO check:

4. Cross‑host SSH config drift: sur, cham, ist accept root via password — jah doesn't (that we can prove) The three root‑password successes in #1 confirm PermitRootLogin yes (or prohibit‑password=no) on sur/cham/ist. jah had zero Accepted password for root events in the same 24h despite getting hit harder than the others (2 731 brute attempts from 183.52.220.171 alone). Either jah is hardened to key‑only root, or just nobody legit logged in there. Either way the three‑host root‑password practice is the higher‑risk side of the drift — recommend moving sur/cham/ist to key‑only root in the next maintenance window.

5. Acronis cluster: Ceph OSD down on ve1.nws.ro at 12:30 EEST yesterday — no recovery event seen in 24h Single Zabbix trigger, severity 4 (Ceph OSD down detected, objectid 27853), value=1, no matching value=0/recovery in the last 24h of ingested events. Could mean the OSD is still down, or the Zabbix recovery just wasn't ingested by Tyrael. Worth a 30‑second check on ve1 Ceph health — if the OSD is genuinely down 19h later, that's degraded redundancy on Acronis.

Did NOT find (deliberately checked): any new cPanel/WHM account creations, any Imunify malware detections (every scan in 24h returned total_malicious: 0; the only "extended‑suspicious" uploads were product JPGs from gregorco/ist and a6/cham — almost certainly false positives), any SSH success matching a brute‑force IP from the same 24h.

Top question I need answered before this gets escalated: #1 — was 82.76.239.154 you?