When files in directories are identified that don't belong, an incidence exists. With UNIX, intruders like to hide files by naming them something that starts with a period (.) because these files are not listed when the standard ls command is given. Get in the habit of checking for these types of files.
Other incidences include promiscuous network interface commands and unusual network connections. These can include the presence of Ethernet sniffers, a Trojaned netstat, etc.
Secure and commercial telephone numbers to DISSA Operations Centers are:
WESTHEM/CONUS OC (STU-III)
To eradicate the problem and the resource, the system administrator will remove the exploited vulnerability by installing patches identified by the ADP Security Group, and running a program such as SPI, COPS, Tiger, Ice-Pick, etc. Use a trusted source to re-install damaged files and retire the name and IP address.
Follow-up should include an assessment of the factors that allowed the intrusion to occur, updating the security policy which addressed this incident, and additional education for users and administrations.