Malware Steal Password on a Linux Server


Open source operating system Linux fame safe from malware attacks or viruses. Because of this reputation, many device servers that rely on Linux as the main brain.

However, this reputation has slowly started to be corrupted by the presence of malware that infects Linux-based Apache web server, detected in December last year.

Latest news, which was released by the manufacturer of the antivirus application ESET malware, mentions a backdoor back detected infecting Linux-based servers.

ESET Malware Research Lab managed to detect the malware results modifications to SSH that doubles as a backdoor on a Linux server.

Modification of SSH daemon which by ESET are identified as Linux/SSHDoor. A it, deliberately designed to be able to steal important data, such as usernames and passwords.

"It is not easy to ascertain how the SSH daemon has been turned into this trojan came in and infect the server. Possibly because the application used is already out of date (need to update/patching), or the password is weak, "said Technical Consultant ESET Indonesia Yudhi Staunchly, in the description of the press received KompasTekno, Wednesday (28/1/2013).

Linux Malware/SSHDoor. A was developed to be able to access the infected server remotely by using a hardcoded password or SSH key.

When the daemon is enabled, the backdoor sends information IP and port where the active server, along with its hostname. Then, when users log in to the server who is infected, his username and password was automatically sent to the server belonging to the hackers.

The Secure Shell Protocol (SSH) is a protocol that is common in Unix and used to protect and secure data communications.

SSH protocol also it also serves to set up a remote server, file transfer, and more. These functions make the SSH protocol has direct access to the server.

The SSH protocol is then harnessed by means of modified.

0 komentar:

Post a Comment

Related Posts Plugin for WordPress, Blogger...