arstechnica.com article on worldwide ssh botnet, over 1500 machines hacked.
FritzFrog spreads by scanning the Internet for SSH servers, and when it finds one, it attempts to log in using a list of credentials.
“These points of evidence, while not damning, lead us to believe a possible link exists to an actor operating in China or an actor masquerading as Chinese,” Akamai researchers wrote.
Yes, this will definitely stop botnets from attacking your servers.Better idea. Quit doing business with China.
Based on your profile you are hailing from the USA.sko It just seems that too many bad things like this come out of China. Yes, elsewhere, too, but too much from a supposedly developed country that wants to play with the rest of the world. And here we are buying goods from them and letting them manufacture our stuff and let them insert malware into routers and everything else.
The way you teach such places a lesson is you don't play with them anymore.
America is the worst spam enabling country on the globe
Spam is typically sent though malware infected hosts. It's what these botnets generally do, besides being a platform for DDoS attacks.Except I'm not talking about spam
This specific malware could also be used to proxy spam. It's also modular, meaning they can add/remove functionality.Yes but I'm talking about malicious bots that take down or control or steal information from servers as the article above is about
Sounds a lot like some of the state-funded malware like the "staatstrojaner" they still desperately want here in germany...This specific malware could also be used to proxy spam. It's also modular, meaning they can add/remove functionality.
… I just can't stand it when the stupidity and/or malice of a few individuals are generalized and reduced to a stereotypical prejudice about nationality/ethnicity/colour/belief etc…
… maybe that's because I'm just old enough to have witnessed the last few years of the old internet-culture (mainly in IRC and usenet) that went by the standards of "I don't care where you live, how you look or what you believe - I just care about what you do, how you use your skills and how you treat other beings", but I still go by that standard. …
I just noticed this. You are confusing where the base product is made with where malware comes from. You can't blame the US for drunk driving accidents in France just cause they drive a Ford. In the same way, you are blaming the US for malware because some other country uses Windows to serve malware.Also following your logic: The OS that is BY FAR the single biggest factor in the existence and spread of malware comes from a US-based company...
Of course it is. It's both unwanted penetration. For me it doesn't make a difference who invades my space. An invader is an invader.we're not talking about the same thing. You are talking government initiated spying. Malware used for nefarious take downs by individuals as hackers is not the same thing.
Incorrect. Snowden taught us that the NSA at the time did a lot of unethical and illegal things. That was about 7 or 8 years ago. Much has changed since, perhaps for the better, or perhaps for the worse. We can be pretty sure that the NSA doesn't do the same things any more. What we don't know is whether the actions of the NSA are now better or worse.Snowden taught us that the NSA is the worst hacker around the globe. It's just hypocritical to blame China.
But it makes a huge difference about how to react and how to protect yourself whether the invader is a government spying agency (which just gathers information), a legitimate business, a set of criminals trying to steal your stuff, or a government agency (typically a military) trying to disrupt your operations, perhaps using technology from or working with a company, or a set of criminals that operate with implicit government blessing.Of course it is. It's both unwanted penetration. For me it doesn't make a difference who invades my space. An invader is an invader.
You're saying I should disable root login as well?and again, everybody: don't ? use ? password ? based ? logins ? for ? ssh ?
This made me laugh, thanks.You're saying I should disable root login as well?
In either case.a set of criminals
Every company that I've ever worked for, that had some linux boxes, had root login as well as password login enabled.This made me laugh, thanks.
The NSA was caught in industrial espionage a long time ago. And the implied OR in your list, reality suggests to have this seen as an AND. Only the order of them might change. And yes, they ALL do this.whether the invader is a government spying agency (which just gathers information), a legitimate business, a set of criminals trying to steal your stuff, or a government agency (typically a military)
F.B.I. Secretly Bought Israeli Spyware and Explored Hacking U.S. Phones
jan. 28, 2022
Israel used the NSO Group’s software as a tool of diplomacy. The F.B.I. wanted it for domestic surveillance.
it is widely regarded as the world’s most potent spyware, capable of reliably cracking the encrypted communications of iPhone and Android smartphones.
The software, Pegasus, made by an Israeli company, NSO Group, has been able to track terrorists and drug cartels. It has also been used against human rights activists, journalists and dissidents.
The U.S. had also moved to acquire Pegasus, The Times found. The F.B.I., in a deal never previously reported, bought the spyware in 2019, despite multiple reports that it had been used against activists and political opponents in other countries. It also spent two years discussing whether to deploy a newer product, called Phantom, inside the United States.
The discussions at the Justice Department and the F.B.I. continued until last summer, when the F.B.I. ultimately decided not to use NSO weapons.
But Pegasus equipment is still in a New Jersey building used by the F.B.I. And the company also gave the agency a demonstration of Phantom, which could hack American phone numbers.
![]()
F.B.I. Secretly Bought Israeli Spyware and Explored Hacking U.S. Phones
Israel used the NSO Group’s software as a tool of diplomacy. The F.B.I. wanted it for domestic surveillance. Then everything soured. Here are highlights of a New York Times Magazine investigation.www.nytimes.com