Linux Hacks & Cracks - Page 9
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Embedded Linux devices are everywhere these days, and sooner or later, you’re going to want to poke around in one of them. But how? Learn the techniques and tools Felipe Astroza has used to hack the Foscam C1 security camera, which will work on a wide range of embedded Linux gadgets.
A new malicious package targeting NodeJS developers using Linux and macOS has been discovered hidden in a fake Browserify NPM package.
The maintainers of the PHP programming language have issued an update regarding the security incident that came to light late last month, stating that the actors may have gotten hold of a user database containing their passwords to make unauthorized changes to the repository. This was initially treated as a compromise of the git.php.net server - but further investigation into the incident has revealed that the commits were a result of pushing them using HTTPS and password-based authentication.
Linux servers are being targeted with sophisticated malware believed to have been developed by Chinese hackers using an end-of-life Red Hat compiler.
Both Linux and Windows servers are being targeted by the dangerous new WatchDog botnet, which uses exploits to take over servers and mine cryptocurrency.
Russian digital espionage group Fancy Bear has incorporated a new Linux-based malware dubbed “Drovorub” into their attack campaigns, according to the National Security Agency (NSA) and the FBI.
Kobalos - A devious new Linux malware - targets high-performance supercomputers and enables attackers to execute arbitrary commands on systems remotely.
The evasive new Pro-Ocean cryptojacking malware is sidestepping security defenses and targeting Apache, Oracle and Redis servers.
The Dovecat Monero-mining malware doesn't steal data, but it consumes large amounts of CPU and memory. This is the latest threat faced by QNAP customers - after research published in July 2020 identified that tens of thousands of NAS drives are potentially vulnerable to malware that prevents administrators from applying patches.
The recently discovered DreamBus botnet uses exploits and brute-force attacks to target PostgreSQL, Redis, SaltStack, Hadoop, Spark, and others enterprise-level apps that run on Linux systems. "The idea is to give the DreamBus gang a foothold on a Linux server where they could later download and install an open-source app that mines the Monero (XMR) cryptocurrency to generate profits for the attackers."
Two recently discovered Linux botnets - DreamBus and FreakOut - are designed for DDoS attacks, cryptocurrency mining and other malicious purposes.
Researchers are tracking a new botnet dubbed "FreakOut" that's targeting vulnerabilities in Linux systems. Botnet operators have been mass-scanning for vulnerable Linux devices, and the command-and-control server associated with FreakOut has now targeted several hundred vulnerable devices.
OpenWRT has disclosed a data breach that occurred after a malicious hacker gained access to a forum admin account. The OpenWRT wiki, which contains the official download links, was not compromised, the project said.
The Linux Foundation has offered suggestions on how we can avoid SolarWinds type attacks in the future. Doing so won't be easy - but it must be done.
Linux has become a popular target among cybercriminal groups, who have started infecting Linux machines via a fileless malware installation technique that until recently was more commonly used against Windows-based systems.
Linux malware authors are leveraging the Ezuri Golang crypter to pack their malware with dangerous zero detection capabilities.
The ElectroRAT cryptocurrency-stealing malware was written from scratch and was likely installed by thousands of Linux, Windows and MacOS users over the past year.
The Golang malware has been active since last month, exploiting poor security practices to target both Linux and Windows-based servers. Implementing 2FA with robust passwords and keeping all running software updated can help protect against Golang and other dangerous attacks.
Security researchers have discovered a new self-spreading Golang-based malware that has been actively dropping XMRig cryptocurrency miners on both Windows and Linux servers since early December.
A newly discovered Windows trojan linked to the AridViper threat group, dubbed PyMICROPSIA, shows signs that it might be used to infect computers running Linux and macOS as well.