[AusNOG] Windigo Malware Trojan alert for linux servers
Paul Foote
pfoote at gmail.com
Fri Mar 21 16:01:23 EST 2014
The article seems very sensationalised, but the detailed report it links to
is a lot more objective and includes this line at the bottom of page 4:
"No vulnerabilities were exploited on the Linux servers; only stolen
credentials were leveraged.
We conclude that password-authentication on servers should be a thing of
the past
Cheers,
Paul
On Thu, Mar 20, 2014 at 8:21 PM, George Fong <george at lateralplains.com>wrote:
> I hope this is not out of place but this is a little disconcerting. The
> article below has a little test in it for a preliminary check.
>
>
> http://blog.eset.ie/2014/03/18/operation-windigo-malware-used-to-attack-over-500000-computers-daily-after-25000-unix-servers-hijacked-by-backdoor-trojan/
>
> Still trying to find out how the trojan gets in and compromises OpenSSH. .
>
> Cheers
> g.
>
> --
>
>
> Just remember, wherever you go ........ there you are.
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140321/4aabef00/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: siggeorge.png
Type: image/png
Size: 36344 bytes
Desc: not available
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20140321/4aabef00/attachment.png>
More information about the AusNOG
mailing list