How to find and fix Fuzz Faster U Fool attacks on a hosted cPanel server attacking ports 2083 and 2086

Fuzz Faster U Fool attacks is a technique whereby attackers scan cPanels servers at incredibly high speed on ports 2083 and 2086 and look for vulnerable files. The attacks have these signatures:

  • Ultra high speed scanning
  • Ports 2083 and 2086 only
  • Ports 2083 will return HTTP 200 and ports 2086 will return HTTP 301
  • Flat filenames are returned, not actual paths

One way of picking up these attacks is if you see a sudden spike in CPU activity on your server. The next thing you’ll have to do to identify the culprit:

[root@server ~]# netstat -tn | grep ESTABLISHED | awk '{split($5,remote,":"); split($4,local,":"); print remote[1] " → " local[2]}' | sort | uniq -c | sort -nr
     24 195.178.110.159 → 2083

As you can see, 24 requests from an unknown  IP address to port 2083. At times we saw 40 requests in one second.

Next, you can either tail the log and/or start tallying the log:

# grep "195.178.110.159" /usr/local/cpanel/logs/access_log

Tallying the counts

Tallying ports 2083 and 2086

# grep "195.178.110.159" /usr/local/cpanel/logs/access_log | awk '{print $NF}' | sort | uniq -c
30004 2083
5573 2086

Tallying HTTP return codes

# grep "195.178.110.159" /usr/local/cpanel/logs/access_log | awk '{print $9}' | sort | uniq -c
30002 200
5572 301
3 401

Blocking

At this time I am not aware of a DoS solution that works with cPanel to detect and block these attacks. What further compounds the issue is the files that return 200 seem apparently random and all over the show, without clear visibility about the full pathname or website.

So block the attacker at your core or border firewall, since if they are attacking this server, they will be attacking other servers as well.

Reference

Share this article

Leave a Reply

Your email address will not be published. Required fields are marked *