攻防最前线:Oracle数据库勒索病毒RushQL死灰复燃

360安全公司处置过程:Oracle数据库勒索病毒RushQL死灰复燃
其他处置方式:https://blog.csdn.net/weixin_38467835/article/details/105261839

  • 查询数据库创建时间又多少天了,这个病毒大于1200天才会执行
SELECT NVL(TO_CHAR(SYSDATE-MIN(LAST_ANALYZED)),0) FROM ALL_TABLES WHERE TABLESPACE_NAME NOT IN ('SYSTEM','SYSAUX','EXAMPLE');
1、查询异常存储过程和触发器
SELECT owner,created,object_name,object_type FROM dba_objects WHERE object_name LIKE '%DBMS_SUPPORT_INTERNAL%'; 
SELECT owner,created,object_name,object_type FROM dba_objects WHERE object_name LIKE '%DBMS_STANDARD_FUN9%'; 
SELECT owner,created,object_name,object_type FROM dba_objects WHERE object_name LIKE '%DBMS_SYSTEM_INTERNA%'; 
SELECT owner,created,object_name,object_type FROM dba_objects WHERE object_name LIKE '%DBMS_CORE_INTERNAL%'; 
SELECT owner,created,object_name,object_type FROM dba_objects WHERE object_name LIKE '%DBMS_SUPPORT_INTERNAL%'; 
SELECT owner,created,object_name,object_type FROM dba_objects WHERE object_name LIKE '%DBMS_SYSTEM_INTERNAL%'; 
SELECT owner,created,object_name,object_type FROM dba_objects WHERE object_name LIKE '%DBMS_CORE_INTERNAL%'; 
  • 删除上面查询的存储过程和触发器
DROP PROCEDURE %DBMS_SUPPORT_INTERNAL%;
DROP PROCEDURE %DBMS_STANDARD_FUN9%;
DROP PROCEDURE %DBMS_SYSTEM_INTERNA%;
DROP PROCEDURE %DBMS_CORE_INTERNAL%;
DROP TRIGGER %DBMS_SUPPORT_INTERNAL%;
DROP TRIGGER %DBMS_SYSTEM_INTERNAL%;
DROP TRIGGER %DBMS_CORE_INTERNAL%; 

如果报错,因为名称中存在空格,可以使用这种方式删除

DROP PROCEDURE "DBMS_SUPPORT_INTERNAL                ";
2、删除异常的jobs:
DELETE FROM dba_jobs WHERE schema_user='username' AND what LIKE '%truncate%';

这一过程可能会持续较长时间,本人查询出异常的job数量有四十多万个。

3、删除trace日志、alter日志、归档日志等,腾出数据空间。

你可能感兴趣的:(攻防最前线:Oracle数据库勒索病毒RushQL死灰复燃)