Hackers Using Supershell Malware To Attack Linux SSH Servers (gbhackers.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 20 Sep 2024 10:57
https://sh.itjust.works/post/25462481

#cybersecurity

threaded - newest

thoughtfuldragon@lemmy.blahaj.zone on 20 Sep 2024 13:56 next collapse

An attacker leveraged wget, curl, tftp, and ftpget commands to download scripts from different sources, including web servers, FTP servers, and even non-standard ports.

Lmao.

undefined@links.hackliberty.org on 21 Sep 2024 01:46 collapse

non-standard ports

đŸ˜±

interurbain1er@sh.itjust.works on 20 Sep 2024 19:57 next collapse

root credentials, including common passwords like “root/password” and “root/123456789,”

Elliptical curves ain’t gonna fix user stupidity


blarth@thelemmy.club on 21 Sep 2024 12:17 next collapse

Am I missing it? There’s seemingly no write up on what the vulnerability actually is, they’re essentially just saying that some poorly managed SSH servers get hacked and then the attackers do stuff.

Edit: oops, reread it. Well, this isn’t really a huge surprise. Just terribly simple root credentials and remote root login enabled.

lnxtx@feddit.nl on 21 Sep 2024 13:02 collapse

Nothing new.