Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Haha maybe that should be running (Score 1) 71

several sources have cited security researchers stating that it's likely due to the Exim CVE exploits. One very detailed article is published here on ITW attempts in using the CVE exploit are being seen to deploy malware: https://securityaffairs.co/wor... I also did some independent research and searched around on Shodan for about 10-15 of of the hosts showing up with lilocked file extensions on their webservers now and they are all 1) Hosted in Russia 2) have out of date EXIM software vulnerable to the recent CVE's posted....

Comment Re:Catch it in the act (Score 1) 71

Is there a way to detect that a file with .lilocked extension is being created and lock that PID down? Would be nice to catch it in the act so we can identify the source of the infection.

if you have root access to the server then i'm sure that you can run ps, watch, strace, iostat, etc to monitor where it's coming from. Now, with that being said, if you have root access, I hope that you are patching your systems and you likely wouldn't have this problem anyway. Sadly all the samples I've found via hunting on VT and referenced in any public sources look like the Decrypter tool and not the malicious binary as well.

Slashdot Top Deals

Surprise due today. Also the rent.

Working...