I just had the same attack on one of my servers last night from the same IP address. It looks like they modified a script to add all these extra users. He saw "Unknown Account: 40 time(s)" and I sawsshd:
Authentication Failures:
root (209.67.215.146): 59 Time(s)
adm (209.67.215.146): 2 Time(s)
apache (209.67.215.146): 1 Time(s)
cyrus (209.67.215.146): 1 Time(s)
matt (209.67.215.146): 1 Time(s)
mysql (209.67.215.146): 1 Time(s)
nobody (209.67.215.146): 1 Time(s)
operator (209.67.215.146): 1 Time(s)
Hm, this looks like a strategic attempt. The SSH attacks I know do not
try accounts like cyrus or apache.
sshd: Invalid Users: Unknown Account: 42 Time(s) So I am wondering if he has the cyrus and news accounts activated.
su: Sessions Opened: (uid=0) -> julian: 2 Time(s) (uid=0) -> cyrus: 1 Time(s) (uid=0) -> news: 1 Time(s) julian(uid=500) -> root: 1 Time(s)
It also looks like the attacker was successful in logging in as cyrus
and news. Is this possible? Could this be potentially damaging to my
system? Or is this something normal which I am overlooking?
From what do you conclude that the attacker logged in as cyrus and news?
I would think it was you as root doing so by running "su - $username".
(One time su'ing from julian to root.) The logwatch entries point to su
actions. If it wasn't you, then switch off the machine from net, as a
foreign person has root control over the host.