AhnLab’s Security Emergency Response Center (ASEC) studies attacks on poorly secured Linux SSH servers and shares the findings on the ASEC Blog.
Attackers need to find out the IP address and SSH account details before installing malware like DDoS bot and CoinMiner. They scan for servers with the SSH service (port 22) activated to carry out brute force or dictionary attacks to get the login information.
By infosecbulletin
/ Wednesday , July 3 2024
Google launched a new bug bounty program called kvmCTF to enhance the security of its Kernel-based Virtual Machine (KVM) hypervisor....
Read More
By infosecbulletin
/ Tuesday , July 2 2024
The Brain Cipher ransomware group to release the decryption keys for Indonesia Terkoneksi on Wednesday. They said their attack aims...
Read More
By infosecbulletin
/ Tuesday , July 2 2024
"A critical vulnerability has been identified in the Google Authentication mechanism of the application. By manipulating the ID and email...
Read More
By infosecbulletin
/ Tuesday , July 2 2024
The Apache Software Foundation has found multiple security issues in the widely used Apache HTTP Server. These vulnerabilities could lead...
Read More
By infosecbulletin
/ Tuesday , July 2 2024
An executive from National Australia Bank reveals that the four major banks in the country face continuous attacks, as threat...
Read More
By infosecbulletin
/ Monday , July 1 2024
There is a security flaw (CVE-2024-20399) in Cisco NX-OS Software that lets an attacker with local access execute commands as...
Read More
By infosecbulletin
/ Monday , July 1 2024
Despite the limited manpower and various limitations, efforts are being made to keep the country's cyber space safe, said the...
Read More
By infosecbulletin
/ Sunday , June 30 2024
Microsoft will assign Common Vulnerabilities and Exposures (CVE) numbers to important vulnerabilities found and fixed in their cloud services. This...
Read More
By infosecbulletin
/ Sunday , June 30 2024
Indonesia's temporary National Data Center (PDN) was attacked by ransomware last Thursday, leading to delays in airport immigration services and...
Read More
By infosecbulletin
/ Saturday , June 29 2024
FortiGuard Labs found an attack that uses the CVE-2021-40444 vulnerability in Microsoft Office. This flaw lets attackers run harmful code...
Read More
ALSO READ:
Barracuda fixes new ESG zero-day exploited by hackers
Threat actors gain more cryptocurrency by controlling more CoinMiners. They also have the ability to launch stronger DDoS attacks by controlling more DDoS bots. However, in order to increase the number of CoinMiners and DDoS bots, they need to gather more information or account credentials from their targets.
In addition to DDoS bots and CoinMiners, attackers can also install malware to perform scanning and brute force or dictionary attacks on infected systems, allowing them to take advantage of more vulnerable systems. Attackers can also just install scanners and sell the breached IP and account credentials on the dark web.
Poorly managed SSH servers can become targets for various types of malware, including SSH scanner, DDoS bots, and CoinMiners. This post analyzes cases of attacks involving these malware.