AhnLab’s Security Emergency Response Center (ASEC) studies attacks on poorly secured Linux SSH servers and shares the findings on the ASEC Blog.
Attackers need to find out the IP address and SSH account details before installing malware like DDoS bot and CoinMiner. They scan for servers with the SSH service (port 22) activated to carry out brute force or dictionary attacks to get the login information.
By infosecbulletin
/ Tuesday , March 4 2025
Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited, targeted exploitation. These flaws affect...
Read More
By infosecbulletin
/ Tuesday , March 4 2025
CISA has advised US federal agencies to secure their systems against attacks targeting vulnerabilities in Cisco and Windows. Although these...
Read More
By infosecbulletin
/ Monday , March 3 2025
MediaTek has released its March 2025 Product Security Bulletin, which highlights new security vulnerabilities affecting various chipsets in smartphones, tablets,...
Read More
By infosecbulletin
/ Monday , March 3 2025
Qualcomm's March 2025 Security Bulletin addresses vulnerabilities in its products, including automotive systems, mobile chipsets, and networking devices. It includes...
Read More
By infosecbulletin
/ Monday , March 3 2025
On Sunday, Poland Minister for Digitalisation Krzysztof Gawkowski said that Polish cybersecurity services found unauthorized access to the IT infrastructure...
Read More
By infosecbulletin
/ Monday , March 3 2025
Security researchers found that datasets used by companies to develop large language models included API keys, passwords, and other sensitive...
Read More
By infosecbulletin
/ Sunday , March 2 2025
Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where officials used a zero-day exploit from Cellebrite to unlock...
Read More
By infosecbulletin
/ Saturday , March 1 2025
DragonForce ransomware targets organizations in Saudi Arabia. An attack on a major Riyadh real estate and construction firm led to...
Read More
By infosecbulletin
/ Saturday , March 1 2025
Microsoft has filed an amended complaint in recent civil litigation, naming the main developers of malicious tools that bypass the...
Read More
By infosecbulletin
/ Friday , February 28 2025
At the Global Investors Summit 2025, Union Minister Ashwini Vaishnaw announced that India’s first indigenous semiconductor chip will be ready...
Read More
ALSO READ:
Barracuda fixes new ESG zero-day exploited by hackers
Threat actors gain more cryptocurrency by controlling more CoinMiners. They also have the ability to launch stronger DDoS attacks by controlling more DDoS bots. However, in order to increase the number of CoinMiners and DDoS bots, they need to gather more information or account credentials from their targets.
In addition to DDoS bots and CoinMiners, attackers can also install malware to perform scanning and brute force or dictionary attacks on infected systems, allowing them to take advantage of more vulnerable systems. Attackers can also just install scanners and sell the breached IP and account credentials on the dark web.
Poorly managed SSH servers can become targets for various types of malware, including SSH scanner, DDoS bots, and CoinMiners. This post analyzes cases of attacks involving these malware.