Dear Community!
In April 2018, In VestaCP detected was a vulnerability that allowed attackers to perform remote code execution for a long time with the rights of root, eventually gaining control over the server.
This has affected many providers of hosting services, installing VestaCP on their customers' servers.
Details of the problem and methods of correction:
https://forum.vestacp.com/viewtopic.php?f=10&t=16556&start=260#p68893
https://forum.vestacp.com/viewtopic.php?f=25&p=68895#p68895
https://forum.vestacp.com/viewtopic.php?f=10&t=16556
https://github.com/serghey-rodin/vesta/commit/eaf9d89096b11daa97f8da507eb369e359cda7dd
The team insists on using the official instruction and its safe methodology. We do not recommend other services, ancillary services, as well as sharing.
One of the members of our community made a mistake and suffered as a result of it. As an exception, the team decided to help him return the stolen masternode. Each member of the community can help by sending any amount of coins the address KnwBnXbqXH1jNUqmbkUzHrEEjTvEc7tZNP
The missing amount of coins will be paid by the KZCash team. We warn about similar situations in the future, we will not cooperate.
We work for the Community!