RedHat Server Security Thread

RedHat Linux 9.0
I think my system is being hacked.  
I saw the  .bash_profile under root have the lines as follows:

# User specific environment and startup programs

I see this differently in other linux box:
export PATH

Can somebody explain what the lines mean ?
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

There's nothing in the .bash_profile that would indicate you have been hacked.  It's a perfectly acceptable profile, except that there's no need to manually set USERNAME
In order to avoid spectulation on such things, you should install and run "chkrootkit" which checks many known methods to see if the system is compromised. You can get the progrem via Yum with 'yum install chkrootkit' or download and compile it from souce. See the home site at 

Here is a good tutorial on installing and using chkrootkit
ChanYiuPongAuthor Commented:
Question abandon.
Redefining Cyber Security w/ AI & Machine Learning

The implications of AI and machine learning in cyber security are massive and constantly growing, creating both efficiencies and new challenges across the board. Join our webinar on Sept. 21st to learn more about leveraging AI and machine learning to protect your business.

Even though you abandoned the question, you received very legitimate answers.
ChanYiuPongAuthor Commented:
well, you give me an article on chkrootkit
But you do not provide the information on what the lines differ means.
Still everyday the server being placed with phlishing sites.
Editing the pages will not clear the trojan, and will not fix the problem. First you need to determine how the system was comprimised. If you edit or attempt to repair the system while someone still has rougue access then they will know you are on to them, and may just decide to format the server on their way out the door.

Please download chkrootkit from the url above, run it, and see if the system is in fact infected.

The differences are probably to force the server to use an alternate command directory, the one containing the infected executables.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Linux Distributions

From novice to tech pro — start learning today.