Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. IoT devices and Linux-based systems targeted by OpenSSH trojan campaign

IoT devices and Linux-based systems targeted by OpenSSH trojan campaign

Scheduled Pinned Locked Moved The Insider News
comlinuxiotsecuritytools
3 Posts 2 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    Kent Sharkey
    wrote on last edited by
    #1

    Microsoft Security[^]:

    Microsoft researchers have recently discovered an attack leveraging custom and open-source tools to target internet-facing Linux-based systems and IoT devices.

    Look over there! Someone else is getting hacked!

    Pay no attention to the OS behind the curtain!

    P 1 Reply Last reply
    0
    • K Kent Sharkey

      Microsoft Security[^]:

      Microsoft researchers have recently discovered an attack leveraging custom and open-source tools to target internet-facing Linux-based systems and IoT devices.

      Look over there! Someone else is getting hacked!

      Pay no attention to the OS behind the curtain!

      P Offline
      P Offline
      Peter_in_2780
      wrote on last edited by
      #2

      Sigh. Like so many other exploits, it starts with brute-forcing a password. The clever bits come later.

      Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012

      K 1 Reply Last reply
      0
      • P Peter_in_2780

        Sigh. Like so many other exploits, it starts with brute-forcing a password. The clever bits come later.

        Software rusts. Simon Stephenson, ca 1994. So does this signature. me, 2012

        K Offline
        K Offline
        Kent Sharkey
        wrote on last edited by
        #3

        When the top few passwords are’12345’ and ‘password’, brute-forcing isn’t a high hurdle . ;P

        TTFN - Kent

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups