Re: I have a suspicious query - Mailing list pgsql-general

From Adrian Klaver
Subject Re: I have a suspicious query
Date
Msg-id 91df04dd-04fc-420d-821c-ffd3786a1c68@aklaver.com
Whole thread Raw
In response to I have a suspicious query  (Edmundo Robles <edmundo@sw-argos.com>)
List pgsql-general

On 7/11/25 10:12 AM, Edmundo Robles wrote:
> Hi
> 
> i have  (PostgreSQL) 13.16 (Debian 13.16-0+deb11u1)
> While monitoring active queries, I came across the following:
> 
> `DROP TABLE IF EXISTS _145e289026a0a2a62de07e49c06d9965; CREATE TABLE 
> _145e289026a0a2a62de07e49c06d9965(cmd_output text); COPY 
> _145e289026a0a2a62de07e49c06d9965 FROM PROGRAM 'BASE64 string'`
> 
> The 'BASE64 string' appears to be a shell script that creates hidden 
> directories, `.xdiag` and `.xperf`, in `/tmp`.
> 
> Could you please help me locate and clean these? I apologize if this is 
> not the appropriate contact for this issue.

Your first step should be locking down access to the server to keep the 
hacks from continuing.

You already seem to know what directories are involved. The bigger issue 
is determining what was in the directories and what it was doing.

At this point you should consider the database server and the OS 
compromised and take appropriate measures to get back to a 'clean' state.

> 
> Thanks,
> Edmundo
> 
> -- 
> 
> 

-- 
Adrian Klaver
adrian.klaver@aklaver.com



pgsql-general by date:

Previous
From: Edmundo Robles
Date:
Subject: I have a suspicious query
Next
From: Kiran K V
Date:
Subject: Query regarding support of test_decoding and PGReplicationStream with Standby Logical Replication