arstechnica ,
@arstechnica@mastodon.social avatar

SSH backdoor has infected 400,000 Linux servers over 15 years and keeps on spreading

Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.

https://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

com ,
@com@mastodon.social avatar

@arstechnica @Viss I wish articles like this would include, up front, the indicators of compromise that I can use to test if the servers I manage are affected. It's the first and most important thing I want to know when learning about a vulnerability.

brent ,
@brent@thecanadian.social avatar

@arstechnica This article is mind-numbingly detailed. Kudos, but even as technology pro with some systems admin experience, a lot of it was above my head.

I feel like it needs more human-relevant details right at the top: whose computers were hacked, whose data got stolen, what other harms were done, and is it (or when will it be) resolved? And what about prevention ongoing?

Anyway, thanks for the conscientiousness.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • All magazines