Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:A 2002 tactic is considered news today (Score 5, Interesting) 34

This particular attack has nothing to do with air-gapped networks, but you're right in that usb drives are used this way. In fact, they are the one and only communication method ever used to jump air-gaps in real attacks (at least that have been publicly reported). Plenty of other theoretical methods have been demonstrated though Dropping this exhaustive analysis here in case anyone's interested in this topic: https://www.welivesecurity.com...

Comment Re:A 2002 tactic is considered news today (Score 5, Informative) 34

The trick is that the spreader component infects newly inserted USB drives and creates shortcuts (.lnk) files with the same filename & icon of the legitimate files. End users don't end up opening "unknown files", they think they are opening files that they expected to be on the drive.

Submission + - Malware Attack Infected 25,000 Linux/UNIX Servers (securityweek.com)

wiredmikey writes: Security researchers from ESET have uncovered a widespread attack campaign that has infected more than 25,000 Linux and UNIX servers around the world.

The servers are being hijacked by a backdoor Trojan as part of a campaign the researchers are calling 'Operation Windigo.' Once infected, victimized systems are leveraged to steal credentials, redirected web traffic to malicious sites and send as much as 35 million spam messages a day. "Windigo has been gathering strength, largely unnoticed by the security community, for more than two and a half years and currently has 10,000 servers under its control," said Pierre-Marc Bureau, security intelligence program manager at ESET, in a statement.

There are many misconceptions around Linux security, and attacks are not something only Windows users need to worry about. The main threats facing Linux systems aren't zero-day vulnerabilities or malware, but things such as Trojanized applications, PHP backdoors, and malicious login attempts over SSH.

ESET recommends webmasters and system administrators check their systems to see if they are compromised, and has published a detailed report presenting the findings and instructions on how to remove the malicious code if it is present.

Slashdot Top Deals

In every hierarchy the cream rises until it sours. -- Dr. Laurence J. Peter

Working...