You are not logged in.
Have people heard about this?
"XOR DDoS takes hold by cracking weak passwords used to protect the command shell of Linux computers. Once the attackers have logged in, they use root privileges to run a script that downloads and executes a malicious binary file. There's no evidence XOR DDoS infects computers by exploiting vulnerabilities in the Linux operating system itself. Akamai's advisory has intrusion-prevention-system signatures for detecting infections and instructions for removing the malware."
http://arstechnica.com/security/2015/09 … s-attacks/
https://www.stateoftheinternet.com/reso … snort.html
It looks like you have to sign up to actually read the advisory. I don't run any servers, but I have my workstation (with ssh active) that runs Arch. I'd like to know what the steps are to detect this exploit to be sure my system isn't part of it.
Offline
https://www.stateoftheinternet.com/reso … ed-to-know
The malware spreads via Secure Shell (SSH) services susceptible to brute-force attacks due to weak passwords.
Are you using SSH with password authentication enabled? If not, according to the snippet above you have nothing to worry about since it's a brute-force attack.
Offline
Nope, only rsa keys with password authentication disabled.
I missed that detail, thanks for pointing it out!
Offline
The news are not that important as it seems. Attackers are restlessly scanning for badly–secured systems: be it SSH with a weak password, a careless developer who posted a credentials for Amazon EC2 on his github repo or a duplicated private key. Nothing new — this continues for years .
Sometimes I seem a bit harsh — don’t get offended too easily!
Offline