Results 1 to 4 of 4

Thread: Food for thought....

  1. #1
    Join Date
    Jun 2008
    Location
    Podunk
    Posts
    32,337
    Blog Entries
    15

    Default Food for thought....

    Picked up via usenet on comp.nz
    http://www.theregister.co.uk/2009/09..._push_malware/

    --
    Cheers Malcolm (Linux Counter #276890)
    SUSE Linux Enterprise Desktop 11 (x86_64) Kernel 2.6.27.29-0.1-default
    up 6 days 7:26, 2 users, load average: 0.05, 0.03, 0.09
    GPU GeForce 8600 GTS Silent - Driver Version: 190.18


  2. #2
    Join Date
    Jun 2008
    Location
    West Yorkshire, UK
    Posts
    3,611

    Default Re: Food for thought....

    People have been saying it was only a matter of time; the question is whether it is possible to keep one step ahead or at least so close behind that nothing lasts for long enough to do serious damage.

  3. #3
    Join Date
    Jan 2009
    Location
    Switzerland
    Posts
    1,529

    Default Re: Food for thought....

    Hi

    At least this seems easy to detect. I still wonder how they get in to hack the system. Wouldn't that need a password AND port 22 open?

  4. #4
    Join Date
    Jan 2008
    Location
    N40 44.977 W073 59.356
    Posts
    1,170

    Default Re: Food for thought....

    vodoo wrote:
    > Hi
    >
    > At least this seems easy to detect. I still wonder how they get in to
    > hack the system. Wouldn't that need a password AND port 22 open?
    >
    >

    Ssh doesn't have to be open to crack a system. Since they are web
    servers, if apache is an unpatched version they could be using that. Any
    vulnerable service they left open could have been used to exploit the
    system.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •