Nearly all IP (intellectual property) are recreated by a competitor. Investigate the development machine
Potential data exfiltration.
netstat -lpeanut shows that there are two dhcp clients running, one using unusual port and user:
ps aux | grep 40500 or ps aux | grep dhclient shows the running processes and sometimes commands used to run them. This suspicious client was run from /tmp folder:
ls -la /tmp/ to see the file that was launched. But nothing there. Seems that the file was deleted after being launched:
netstat, see the weird python script with established connection to some remote host:
lsof -p 2082 and ps aux grep 2082.
/tmp/ folder for backdoor executable/proc/2082 and ls
/proc/2082 run sudo cat cmdline shows the comand used to launch, cat task/2082/children shows children PID. sudo cat status shows general information. cat environ shows … . cat arp shows MAC addresses of the machines connected: