Tuesday , January 28 2025
Coding

Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining

AhnLab’s Security Emergency Response Center (ASEC) studies attacks on poorly secured Linux SSH servers and shares the findings on the ASEC Blog.

Attackers need to find out the IP address and SSH account details before installing malware like DDoS bot and CoinMiner. They scan for servers with the SSH service (port 22) activated to carry out brute force or dictionary attacks to get the login information.

GitHub Desktop Vuln Credential Leaks via Malicious Remote URLs

Multiple security vulnerabilities have been found in GitHub Desktop and other Git projects. If exploited, these could allow attackers to...
Read More
GitHub Desktop Vuln Credential Leaks via Malicious Remote URLs

Burp Suite 2025.1 released: Featuring Intruder Capabilities & Bug Fixes

PortSwigger has launched Burp Suite 2025.1, adding new features and improvements to enhance usability and efficiency for penetration testers. This...
Read More
Burp Suite 2025.1 released: Featuring Intruder Capabilities & Bug Fixes

UnitedHealth confirms 190 million impacted by 2024 data breach

UnitedHealth confirmed that the ransomware attack on its Change Healthcare unit last February impacted about 190 million Americans, nearly double...
Read More
UnitedHealth confirms 190 million impacted by 2024 data breach

Registration Open For BCS CTF 2025

So, to test your cyber security skill, here is another chance to do that. Bangladesh computer society (BCS) is going...
Read More
Registration Open For BCS CTF 2025

New Ransomware Tactics Target VMware ESXi Via SSH Tunneling

Sygnia's recent report highlights the changing strategies of ransomware groups targeting VMware ESXi appliances. These attackers exploit vital virtual infrastructure...
Read More
New Ransomware Tactics Target VMware ESXi Via SSH Tunneling

Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting...
Read More
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass

CISA Releases 6 ICS Advisories Detailing Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released 6 advisories for Industrial Control Systems (ICS), highlighting vulnerabilities in various...
Read More
CISA Releases 6 ICS Advisories Detailing Security Issues

Account Credentials for Security Vendors Found on Dark Web: Cyble Report

# "While many leaked security credentials belong to customers, some exposed sensitive accounts suggest that security vendors too have been...
Read More
Account Credentials for Security Vendors Found on Dark Web: Cyble Report

Four Critical Ivanti CSA Vulnerabilities Exploited: CISA , FBI warns

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory...
Read More
Four Critical Ivanti CSA Vulnerabilities Exploited: CISA , FBI warns

GitLab Releases Patch (CVE-2025-0314) for XSS Exploit

GitLab has released update for high severity cross-site scripting (XSS) flaw. Versions 17.8.1, 17.7.3, and 17.6.4 for both Community Edition...
Read More
GitLab Releases Patch  (CVE-2025-0314) for XSS Exploit

ALSO READ:

Barracuda fixes new ESG zero-day exploited by hackers

Threat actors gain more cryptocurrency by controlling more CoinMiners. They also have the ability to launch stronger DDoS attacks by controlling more DDoS bots. However, in order to increase the number of CoinMiners and DDoS bots, they need to gather more information or account credentials from their targets.

In addition to DDoS bots and CoinMiners, attackers can also install malware to perform scanning and brute force or dictionary attacks on infected systems, allowing them to take advantage of more vulnerable systems. Attackers can also just install scanners and sell the breached IP and account credentials on the dark web.

Poorly managed SSH servers can become targets for various types of malware, including SSH scanner, DDoS bots, and CoinMiners. This post analyzes cases of attacks involving these malware.

Check Also

Privilege Escalation

CVE-2025-20156
Cisco Fixes Meeting Management Allowing Privilege Escalation

Cisco has released a security advisory concerning a critical privilege escalation vulnerability (CVE-2025-20156) in its …

Leave a Reply

Your email address will not be published. Required fields are marked *