Unwelcome Guests
C2 server scanning attempts detected
The C2 Server Setup
To create a realistic Command & Control infrastructure for our rootkit project, we deployed a C2 server on a Scaleway VPS (51.159.97.114).
The server was configured to run both the C2 backend and web interface, with DNS records pointing the domain epirootkit.com to it. We set up a specific subdomain jules_chef_de_majeur.epirootkit.com for rootkit client communications.

Upon investigation, these connections originated from US-based VPN IP addresses 65.49.1.*, likely automated bots scanning for open ports.
| Port | Service | Purpose | 
|---|---|---|
| 22 | SSH | Remote server administration | 
| 3000 | C2 Web Interface | Rootkit control panel | 
| 4444 | Rootkit Client | Client connections | 
And of course there is a password to access the C2 web interface. And anyway.. I set it up so that nobody else can access it right… ?
VPN Access
I set up a zero trust VPN access (Twingate) to restrict access to the C2 server UI.
While connected to the VPN you can access the web interface with : http://c2.epirootkit.com:3000

In addition with iptables rules, this should be enough to block the bots :
  ubuntu@sys2:~/epirootkit$ sudo iptables -nvL                      LABEL_DEPLOYED_BY="linux" bash
Chain INPUT (policy DROP 959 packets, 177K bytes)
 pkts bytes target     prot opt in     out     source               destination
10778 1690K ACCEPT     0    --  *      *       0.0.0.0/0            0.0.0.0/0            ctstate RELATED,ESTABLISHED
   24  1516 ACCEPT     0    --  lo     *       0.0.0.0/0            0.0.0.0/0
    0     0 ACCEPT     6    --  *      *       REDACTED             0.0.0.0/0            tcp dpt:22
    0     0 ACCEPT     6    --  *      *       163.5.3.68           0.0.0.0/0            tcp dpt:22
    0     0 ACCEPT     6    --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:4444
    0     0 ACCEPT     17   --  *      *       0.0.0.0/0            0.0.0.0/0            udp dpt:4444
Chain FORWARD (policy DROP 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               destination
Chain OUTPUT (policy ACCEPT 11067 packets, 2343K bytes)
 pkts bytes target     prot opt in     out     source               destination
  | Port | Service | Allowed Source IPs | Access Rule | 
|---|---|---|---|
| 22 | SSH | REDACTED, 163.5.3.68 | ACCEPT (trusted IPs only) | 
| 4444 | Rootkit Client | 0.0.0.0/0 | ACCEPT (rootkit client connections) | 
| * | All other services | * | DROP (all other traffic blocked) | 
I’m considering putting a honeypot on the server to catch and analyse them.