apple je malware

Moderator/ica: Moderatori/ce
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
https://mariadb.com/kb/en/mariadb/maria ... ase-notes/
Ako imate ideju za razvoj inovativnog INFOSEC proizvoda ili usluge, mi imamo odmah zainteresirane investitore.
shrike je napisao/la:https://www.theinquirer.net/inquirer/news/3066979/this-linux-virus-is-a-total-jerk-even-by-malware-standards?fbclid=IwAR2SNVMqs1bwj7zFC16FjnpfdsMeD_HfaKv0VL21teVKPAGgjiXvalN3j48
Linux virus koji uđe na sustav i rudari kriptovalutu monero.
Asked about how the malware could gain access to systems, Vurasko responded, "In the first place it works like this: somebody searches for servers with [the] SSH port open; he is trying to brute [force] servers he found; if the brute force attack was successful, he connects to the compromised server using brute-forced credentials and starts the malware."
jurastublic je napisao/la:shrike je napisao/la:https://www.theinquirer.net/inquirer/news/3066979/this-linux-virus-is-a-total-jerk-even-by-malware-standards?fbclid=IwAR2SNVMqs1bwj7zFC16FjnpfdsMeD_HfaKv0VL21teVKPAGgjiXvalN3j48
Linux virus koji uđe na sustav i rudari kriptovalutu monero.
Molim lijepo, nije virus nego malware skripta. I ne "uđe u sustav" ništa lakše nego moja baba.
Nemoj nasjedati na te poluinformacije, evo ti pravi članak o tom "malware-u":
https://www.itwire.com/security/85406-l ... h-ssh.html
ukratko citat čovjeka odgovornog za pronalaženje (ili možda i pisanje - tko zna) te malware skripte:Asked about how the malware could gain access to systems, Vurasko responded, "In the first place it works like this: somebody searches for servers with [the] SSH port open; he is trying to brute [force] servers he found; if the brute force attack was successful, he connects to the compromised server using brute-forced credentials and starts the malware."
Znači, brute force lutrija da dobiješ root, ništa ovdje za vidjeti - idemo dalje.
shrike je napisao/la:Drago mi je da se topic prati![]()