Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Poorly Secure Linux SSH Servers Under Cryptocurrency Mining Attack
    Cyber Security

    Poorly Secure Linux SSH Servers Under Cryptocurrency Mining Attack

    techempireBy techempire1 Comment2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportDecember 27, 2023Editorial DepartmentMalware/Server Security

    Poorly secure Linux SSH servers are being targeted by bad actors installing port scanners and dictionary attack tools with the goal of targeting other vulnerable servers and pulling them into the network for cryptocurrency mining and decentralized denial of service Service (DDoS) attack.

    “Threat actors also have the option of simply installing scanners and selling compromised IP and account credentials on the dark web,” the ANLab Security Emergency Center (ASEC) said in a report on Tuesday.

    In these attacks, attackers attempt to guess a server’s SSH credentials by executing a list of common combinations of usernames and passwords, a technique known as a dictionary attack.

    If the brute force attempt is successful, the threat actor deploys additional malware, including scanners, to scan other vulnerable systems on the network.

    Specifically, the scanner is designed to look for systems with active port 22 (associated with the SSH service) and then repeat the dictionary attack process to install the malware, effectively spreading the infection.

    Internet security

    Another noteworthy aspect of the attack is executing commands such as “grep -c ^processor /proc/cpuinfo” to determine the number of CPU cores.

    ASEC said: “These tools are believed to have been created by the PRG old Team, and each threat actor slightly modified them before using them for attacks.” He added that there is evidence of such malware as early as 2021 has been used.

    To mitigate the risks associated with these attacks, users are advised to use passwords that are difficult to guess, rotate passwords regularly, and keep their systems up to date.

    The findings come as Kaspersky revealed that a new multi-platform threat called NKAbuse is exploiting a decentralized peer-to-peer network connection protocol called NKN (short for New Networks) as a communication conduit for DDoS attacks.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.