ramnode因为SolusVM 被干
As many of you are aware, we were attacked with a zero day SolusVM exploit early this morning. Several of our VPS nodes were partially or fully wiped within two hours of SolusVM publishing the exploit. We are currently working to restore full functionality to our SolusVM CP, our Client Area, and all impacted nodes. If we have a backup of your VPS, we will be restoring it as soon as possible. For those without backups, you will be able to reinstall the OS once we enable SolusVM access.As part of the exploit, our SolusVM database was briefly leaked. If your VPS is online, you should change your root password over SSH. Any passwords that were created or changed in SolusVM itself may be compromised. No Client Area data was compromised as part of this attack.
Please monitor our 推特 accounts (@RamNode and @NodeStatus) for updates. You can also stay up to date in our IRC channel (#ramnode on irc.esper.net).
Thanks for your continued support and prayers as we deal with this extremely difficult trial.
Thanks,
Nick
http://ramnode.com/solusvmexploit.html 早上就知道了 最近SolusVM爆了2个洞了
页:
[1]