Linux backdoor squirts code into SSH to keep its badness buried
Security researchers have discovered a Linux backdoor that uses a covert communication protocol to disguise its presence on compromised systems. The malware was used in an attack on a large (unnamed) hosting provider back in May. It cleverly attempted to avoid setting off any alarm bells by injecting its own communications into legitimate traffic, specifically SSH chatter.
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.