Welcome to World of IPTV

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Forum Rules

Our Rules: Read to avoid getting banned!

Advertising

Introduce Yourself to the World with Us!

Resource Database

Find the newest resources around IPTV!

Account upgrade

Upgrade your account to unlock more benefits!

Request "Under Attack by Slyslanting Fox! We Need Your Help!"

kocero64

Extended Member
Ext. Member
Joined
Sep 19, 2019
Messages
75
Reaction score
485
Points
64
Location
Germany
Hello friends,

For the past week, we've been getting hacked by someone named "Slyslanting Fox." As you can see in the image, they are deleting our load balancers and renaming the main server with names like the one shown in the image. When we contacted them via Telegram, they said they would tell us how to fix the vulnerability in the panel for 500 euros. If anyone knowledgeable about this issue can help, we would greatly appreciate it.

Screenshot_20250123_151914_Samsung Internet.jpg
 
Last edited:
Hello friends,

For the past week, we've been getting hacked by someone named "Slyslanting Fox." As you can see in the image, they are deleting our load balancers and renaming the main server with names like the one shown in the image. When we contacted them via Telegram, they said they would tell us how to fix the vulnerability in the panel for 500 euros. If anyone knowledgeable about this issue can help, we would greatly appreciate it.

View attachment 5674
There is a fix/patch for that hack released by a developer of xui. Do some search in the forum (or internet). After the patch, they wont be able to hack you anymore.
 
There is a fix/patch for that hack released by a developer of xui. Do some search in the forum (or internet). After the patch, they wont be able to hack you anymore.
Hello friends,

For the past week, we've been getting hacked by someone named "Slyslanting Fox." As you can see in the image, they are deleting our load balancers and renaming the main server with names like the one shown in the image. When we contacted them via Telegram, they said they would tell us how to fix the vulnerability in the panel for 500 euros. If anyone knowledgeable about this issue can help, we would greatly appreciate it.

View attachment 5674

There is a fix/patch for that hack released by a developer of xui. Do some search in the forum (or internet). After the patch, they wont be able to hack you

There is a fix/patch for that hack released by a developer of xui. Do some search in the forum (or internet). After the patch, they wont be able to hack you anymore.
He is already on 1.5.13, it shows in the picture. Did the original poster change the streaming key after updating the panel to latest version?
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changcdn
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

I am a VOD Provider Contact
Content Quality Access Support Free Test
100K+VOD 23+ Languages High-Speed Server Fast Import TG@lileimom
200K+series 1080p/4K Globally accessible Synchronous update script TG@lileimom

He is already on 1.5.13, it shows in the picture. Did the original poster change the streaming key after updating the panel to latest version?
Yes, I am using the original new version, bro, but whoever this hacker is, they keep managing to access the main server. And as you said, I couldn't find any fix/patch anywhere.
 
May there is a different vulnerability.
You should get in contact with @GTAXUI
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changcdn
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

I am a VOD Provider Contact
Content Quality Access Support Free Test
100K+VOD 23+ Languages High-Speed Server Fast Import TG@lileimom
200K+series 1080p/4K Globally accessible Synchronous update script TG@lileimom

He is already on 1.5.13, it shows in the picture. Did the original poster change the streaming key after updating the panel to latest version?
He was on 1.5.5 when he was initially hacked then upgraded to 1.5.13. I've had contact with SlySlantingFox who has stated that the fix I provided for 1.5.13 did work and that was the method he was using to get in, however he's pretty switched on so when he does get in he finds a way to stick around...

Realistically you're still safe on 1.5.13, but if he had hacked you on a prior version then there's no guarantees at all. But I released the fix months ago, you all should have upgraded by now.
 
He was on 1.5.5 when he was initially hacked then upgraded to 1.5.13. I've had contact with SlySlantingFox who has stated that the fix I provided for 1.5.13 did work and that was the method he was using to get in, however he's pretty switched on so when he does get in he finds a way to stick around...

Realistically you're still safe on 1.5.13, but if he had hacked you on a prior version then there's no guarantees at all. But I released the fix months ago, you all should have upgraded by now.
Thanks for the clarification mate (y)
 
He was on 1.5.5 when he was initially hacked then upgraded to 1.5.13. I've had contact with SlySlantingFox who has stated that the fix I provided for 1.5.13 did work and that was the method he was using to get in, however he's pretty switched on so when he does get in he finds a way to stick around...

Realistically you're still safe on 1.5.13, but if he had hacked you on a prior version then there's no guarantees at all. But I released the fix months ago, you all should have upgraded by now.
So far so good, thank you very much Gta🫂🫂
 

I am a VOD Provider Contact
Content Quality Access Support Free Test
100K+VOD 23+ Languages High-Speed Server Fast Import TG@lileimom
200K+series 1080p/4K Globally accessible Synchronous update script TG@lileimom

Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changcdn
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com
Some TIPS to secure your server:

  1. Perform a new installation of xui.one v1.5.13 on your MAIN and all LB's
  2. Regenerate a your Admin Access Code, delete all unnecessary access codes like reseller, MAG if you not use them.
  3. Restrict your API Services
  4. Upgrade the Redis latest version on your Main Server (the v4.x Redis Server has Vulnerabilities)
  5. Upgrade your OpenSSH server on your Main Server and LB's

Build Redis from Source (Latest Version) >> only required if you realy activated and use Redis Connection Handler

  1. Find the Redis Process

    Code:
    ps aux | grep redis

    You should see a line like this:

    Code:
    xui      1234  0.5  0.3  56789 12345 ? Ssl  12:34   0:05 /home/xui/bin/redis/redis-server 127.0.0.1:6379
    The 1234 in this example is the process ID (PID).

  2. Kill the Redis Process

    Code:
    kill -9 1234
    or stop it with:
    Code:
    pkill redis-server

  3. Backup the Old Redis

    Code:
    mv /home/xui/bin/redis/redis-server /home/xui/bin/redis/redis-server.old

  4. Install dependencies

    Code:
    sudo apt update
    sudo apt install -y build-essential tcl

  5. Download and compile the latest Redis

    Code:
    wget [URL]http://download.redis.io/redis-stable.tar.gz[/URL]
    tar xzvf redis-stable.tar.gz
    cd redis-stable
    make -j$(nproc)
    sudo make install

  6. Check if the Compilation Was Successful

    Code:
    src/redis-server --version

  7. Replace the Old Redis Binary

    Code:
    cp src/redis-server /home/xui/bin/redis/

  8. Verify the new binary

    Code:
    /home/xui/bin/redis/redis-server --version

  9. Uncomment the server-threads and server-thread-affinity Directive in redis.conf (directives is not supported in Redis 7.4.2)

    Code:
    nano /home/xui/bin/redis/redis.conf

    Comment them out:
    Code:
    # server-threads 4
    # server-thread-affinity true

  10. Start Redis using the updated binary

    Code:
    /home/xui/bin/redis/redis-server /home/xui/bin/redis/redis.conf


Build OpenSSH from Source (Latest Version)

  1. Install dependencies

    Code:
    sudo apt update
    sudo apt install -y build-essential zlib1g-dev libssl-dev libpam0g-dev

  2. Download and compile the latest OpenSSH

    Code:
    wget [URL]https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.7p1.tar.gz[/URL]
    tar -xzf openssh-9.7p1.tar.gz
    cd openssh-9.7p1
    ./configure --prefix=/usr --sysconfdir=/etc/ssh
    make -j$(nproc)
    sudo make install

  3. Restart OpenSSH

    Code:
    sudo systemctl restart ssh
 
Last edited:
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changcdn
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

I am a VOD Provider Contact
Content Quality Access Support Free Test
100K+VOD 23+ Languages High-Speed Server Fast Import TG@lileimom
200K+series 1080p/4K Globally accessible Synchronous update script TG@lileimom

Some TIPS to secure your server:

  1. Perform a new installation of xui.one v1.5.13 on your MAIN and all LB's
  2. Regenerate a your Admin Access Code, delete all unnecessary access codes like reseller, MAG if you not use them.
  3. Restrict your API Services
  4. Upgrade the Redis latest version on your Main Server (the v4.x Redis Server has Vulnerabilities)
  5. Upgrade your OpenSSH server on your Main Server and LB's

Build Redis from Source (Latest Version) >> only required if you realy activated and use Redis Connection Handler

  1. Find the Redis Process

    Code:
    ps aux | grep redis

    You should see a line like this:

    Code:
    xui      1234  0.5  0.3  56789 12345 ? Ssl  12:34   0:05 /home/xui/bin/redis/redis-server 127.0.0.1:6379
    The 1234 in this example is the process ID (PID).

  2. Kill the Redis Process

    Code:
    kill -9 1234
    or stop it with:
    Code:
    pkill redis-server

  3. Backup the Old Redis

    Code:
    mv /home/xui/bin/redis/redis-server /home/xui/bin/redis/redis-server.old

  4. Install dependencies

    Code:
    sudo apt update
    sudo apt install -y build-essential tcl

  5. Download and compile the latest Redis

    Code:
    wget http://download.redis.io/redis-stable.tar.gz
    tar xzvf redis-stable.tar.gz
    cd redis-stable
    make -j$(nproc)
    sudo make install

  6. Check if the Compilation Was Successful

    Code:
    src/redis-server --version

  7. Replace the Old Redis Binary

    Code:
    cp src/redis-server /home/xui/bin/redis/

  8. Verify the new binary

    Code:
    /home/xui/bin/redis/redis-server --version

  9. Uncomment the server-threads and server-thread-affinity Directive in redis.conf (directives is not supported in Redis 7.4.2)

    Code:
    nano /home/xui/bin/redis/redis.conf

    Comment them out:
    Code:
    # server-threads 4
    # server-thread-affinity true

  10. Start Redis using the updated binary

    Code:
    /home/xui/bin/redis/redis-server /home/xui/bin/redis/redis.conf


Build OpenSSH from Source (Latest Version)

  1. Install dependencies

    Code:
    sudo apt update
    sudo apt install -y build-essential zlib1g-dev libssl-dev libpam0g-dev

  2. Download and compile the latest OpenSSH

    Code:
    wget https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.7p1.tar.gz
    tar -xzf openssh-9.7p1.tar.gz
    cd openssh-9.7p1
    ./configure --prefix=/usr --sysconfdir=/etc/ssh
    make -j$(nproc)
    sudo make install

  3. Restart OpenSSH

    Code:
    sudo systemctl restart ssh
Hi. Great tutorial.
When you mean ''Restrict your API Services", do you mean to whitelist from the following settings? General Settings > API > "api services" Admin Streaming IP's, API IP's and API Password. Could you please provide an example of what you think is safe. further clarification regarding these often forgotten settings would be very helpful as there seems to be no consensus or discussion about them. thanks and regards
 
Hi. Great tutorial.
When you mean ''Restrict your API Services", do you mean to whitelist from the following settings? General Settings > API > "api services" Admin Streaming IP's, API IP's and API Password.
Yes exactly.

Could you please provide an example of what you think is safe.
Mate isn’t that part self-explanatory?
And there also descriptions where its explained more in details.

1740149101009.png
 
Yes exactly.


Mate isn’t that part self-explanatory?
And there also descriptions where its explained more in details.

View attachment 5733
Sorry for not being clear in my previous post, but what I really wanted to ask is whether to leave API IP blank or not. When left blank, does the system accept api calls from any ip or none? If any ip, it could be a security risk if left blank, especially without api password, although the attacker would have to 'guess' the api key and know the access code. I have been thinking about this matter for a while but could not find clarification here or elsewhere. thanks
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changcdn
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

I am a VOD Provider Contact
Content Quality Access Support Free Test
100K+VOD 23+ Languages High-Speed Server Fast Import TG@lileimom
200K+series 1080p/4K Globally accessible Synchronous update script TG@lileimom

Issue sumary

The XUI One panel is allowing requests even when IP whitelisting is enabled. This happens because, after analyzing the decrypted api.php, the panel does not correctly detect the requesting IP.

Actions Taken

Implemented protection on version 1.5.5, since versions 1.5.12 and 1.5.13 cause high CPU usage.

Set up logging to capture incoming API requests, showing both the IP and request details for better monitoring.

Video:

 
Last edited by a moderator:
Issue sumary

The XUI One panel is allowing requests even when IP whitelisting is enabled. This happens because, after analyzing the decrypted api.php, the panel does not correctly detect the requesting IP.

Actions Taken

Implemented protection on version 1.5.5, since versions 1.5.12 and 1.5.13 cause high CPU usage.

Set up logging to capture incoming API requests, showing both the IP and request details for better monitoring.

Video:

Xui 1.5.5
That’s not good news. Could you tell us how best to secure it, once you know exactly how it works, or may be make the decrypted php file available? I think it would help the whole community. Thanks
 
Issue sumary

The XUI One panel is allowing requests even when IP whitelisting is enabled. This happens because, after analyzing the decrypted api.php, the panel does not correctly detect the requesting IP.

Actions Taken

Implemented protection on version 1.5.5, since versions 1.5.12 and 1.5.13 cause high CPU usage.

Set up logging to capture incoming API requests, showing both the IP and request details for better monitoring.

Video:

Xui 1.5.5
Recommendation

I found that once a load balancer is infected, it becomes easy for the attacker to persist and regain access to XUI One 1.5.13.

Security Recommendation

If a system is ever compromised, the best approach is to change the IP addresses or format the machine to fully remove any backdoors or persistent threats.
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changcdn
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

I am a VOD Provider Contact
Content Quality Access Support Free Test
100K+VOD 23+ Languages High-Speed Server Fast Import TG@lileimom
200K+series 1080p/4K Globally accessible Synchronous update script TG@lileimom

Some TIPS to secure your server:

  1. Perform a new installation of xui.one v1.5.13 on your MAIN and all LB's
  2. Regenerate a your Admin Access Code, delete all unnecessary access codes like reseller, MAG if you not use them.
  3. Restrict your API Services
  4. Upgrade the Redis latest version on your Main Server (the v4.x Redis Server has Vulnerabilities)
  5. Upgrade your OpenSSH server on your Main Server and LB's

Build Redis from Source (Latest Version) >> only required if you realy activated and use Redis Connection Handler

  1. Find the Redis Process

    Code:
    ps aux | grep redis

    You should see a line like this:

    Code:
    xui      1234  0.5  0.3  56789 12345 ? Ssl  12:34   0:05 /home/xui/bin/redis/redis-server 127.0.0.1:6379
    The 1234 in this example is the process ID (PID).

  2. Kill the Redis Process

    Code:
    kill -9 1234
    or stop it with:
    Code:
    pkill redis-server

  3. Backup the Old Redis

    Code:
    mv /home/xui/bin/redis/redis-server /home/xui/bin/redis/redis-server.old

  4. Install dependencies

    Code:
    sudo apt update
    sudo apt install -y build-essential tcl

  5. Download and compile the latest Redis

    Code:
    wget [URL]http://download.redis.io/redis-stable.tar.gz[/URL]
    tar xzvf redis-stable.tar.gz
    cd redis-stable
    make -j$(nproc)
    sudo make install

  6. Check if the Compilation Was Successful

    Code:
    src/redis-server --version

  7. Replace the Old Redis Binary

    Code:
    cp src/redis-server /home/xui/bin/redis/

  8. Verify the new binary

    Code:
    /home/xui/bin/redis/redis-server --version

  9. Uncomment the server-threads and server-thread-affinity Directive in redis.conf (directives is not supported in Redis 7.4.2)

    Code:
    nano /home/xui/bin/redis/redis.conf

    Comment them out:
    Code:
    # server-threads 4
    # server-thread-affinity true

  10. Start Redis using the updated binary

    Code:
    /home/xui/bin/redis/redis-server /home/xui/bin/redis/redis.conf


Build OpenSSH from Source (Latest Version)

  1. Install dependencies

    Code:
    sudo apt update
    sudo apt install -y build-essential zlib1g-dev libssl-dev libpam0g-dev

  2. Download and compile the latest OpenSSH

    Code:
    wget [URL]https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.7p1.tar.gz[/URL]
    tar -xzf openssh-9.7p1.tar.gz
    cd openssh-9.7p1
    ./configure --prefix=/usr --sysconfdir=/etc/ssh
    make -j$(nproc)
    sudo make install

  3. Restart OpenSSH

    Code:
    sudo systemctl restart ssh
Sharing tips and strategies like this are rare but appreciate if you do more thanks
 
shape1
shape2
shape3
shape4
shape5
shape6
Back
Top