Details in the threat advisory
|
Author | Content |
---|---|
dotmatrix Apr 08, 2016 10:07 AM EDT |
It's linked in the article, but here it is again: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/bill-gates-botnet-threat-advisory.pdf My main concern is usually ... how do I protect myself from initial infection? Threat Advisory wrote:The attackers are using the same methods for infection, which are primarily SSH brute force attempts for root login credentials (previously it was reported that infection methods include a vulnerability in ElasticSearch Java VM). So... in general, if you are running an Internet facing server and are using keys and only keys to login through SSH, you are probably OK. |
Posting in this forum is limited to members of the group: [ForumMods, SITEADMINS, MEMBERS.]
Becoming a member of LXer is easy and free. Join Us!