Skip to main content

Disable remote root access via SSH right now.



Linux malware has been discovered



Malware itself doesn't include any exploitation module to hack into Linux machines; instead, the attackers are using other Trojans and techniques to compromise devices at the first place and then create a new backdoor login account using the username as "mother" and password as "fucker."Once backdoored and the attacker gets the list of all successfully compromised Linux machines, and then logs into them via SSH protocol and installs the SOCKS5 proxy server using Linux.Proxy.10 malware on it.This Linux malware is not at all sophisticated since it uses a freeware source code of the Satanic Socks Server to setup a proxy.


Linux users and administrators are recommended to tighten SSH security by limiting or disabling remote root access via SSH, and to know if your system has already been compromised, keep a regular watch on newly generated login users.

Solution:
Just edit /etc/ssh/sshd_config and set PermitRootLogin to 'no'. After that restart sshd daemon.

Other malware infecting Linux is Moose


Linux/Moose is a malware family that primarily targets Linux-based consumer routers but that can also infect other Linux-based embedded systems in its path. The compromised devices are used to steal unencrypted network traffic and offer proxying services to the botnet operator.




Popular posts from this blog

The possibility of quantum computing breaking encryption algorithms

The possibility of breaking encryption algorithms is a powerful motivating factor for many countries of the world. Thus, knowledge of the enemy's encryption systems could give a huge advantage in intelligence, while at the same time contributing to the conduct of new fundamental research in the field of physics, since modern experimental systems have at their disposal only less than 100 qubits.    To achieve the useful computing performance of a supercomputer, we probably need machines with hundreds of thousands of qubits. In order for the devices to function correctly, they must correct all minor random errors in the software. In a quantum computer, such errors arise due to imperfect elements of the circuit and the interaction of qubits with their environment. For these reasons, qubits can lose coherence in literally a split second. A quantum computer with 100 qubits can simultaneously represent 2100 solutions. For some tasks, this exponential parallelism can be used to create a h

How to install cloudflare wrap on linux

 command mode dumb......expert user edition   millen@TechGlyphs-Studio:~/Desktop$ wrap-cli wrap-cli: command not found millen@TechGlyphs-Studio:~/Desktop$ curl https://pkg.cloudflareclient.com/pubkey.gpg | sudo gpg --yes --dearmor --output /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg Command 'curl' not found, but can be installed with: sudo snap install curl  # version 7.86.0, or sudo apt  install curl  # version 7.81.0-1ubuntu1.6 See 'snap info curl' for additional versions. [sudo] password for millen:  gpg: no valid OpenPGP data found. millen@TechGlyphs-Studio:~/Desktop$ sudo apt  install curl Reading package lists... Done Building dependency tree... Done Reading state information... Done The following packages were automatically installed and are no longer required:   chromium-codecs-ffmpeg-extra gstreamer1.0-vaapi libflashrom1 libftdi1-2   libgstreamer-plugins-bad1.0-0 Use 'sudo apt autoremove' to remove them. The following NEW packages will be in

Simple steps to protect your privacy.

  Step 1. Download DuckDuckGo on all your devices With just one download you'll get tracker blocking, private searching, increased encrypting, and privacy grading on all of your browsing. Our mobile app for iOS/Android (DuckDuckGo Privacy Browser) and browser extensions for Firefox, Chrome, and Safari (DuckDuckGo Privacy Essentials) has all of this in one seamless package. Privacy, simplified. Step 2. Update your software Your device operating systems get out-of-date over time, and old software can contain security bugs or settings that leak personal data. Set your devices (and the apps on them) them to update automatically. That way you'll always have the latest, safest versions. Step 3. Update your privacy settings Make sure your devices are using the best privacy settings. Here are step-by-step instructions for all the major device types. Especially make sure you adjust per-app location settings, so that your location history isn’t leaking where it shouldn’t. For extra bonus