• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining

You are here: Home / Cyber Security News / Warning: Poorly Secured Linux SSH Servers Under Attack for Cryptocurrency Mining

Badly secured Linux SSH servers are getting qualified by negative actors to set up port scanners and dictionary attack applications with the target of focusing on other vulnerable servers and co-opting them into a network to have out cryptocurrency mining and distributed denial-of-service (DDoS) assaults.

“Risk actors can also opt for to put in only scanners and provide the breached IP and account qualifications on the dark web,” the AhnLab Security Crisis Reaction Middle (ASEC) mentioned in a report on Tuesday.

In these attacks, adversaries attempt to guess a server’s SSH credentials by working by way of a checklist of normally utilized combos of usernames and passwords, a procedure named dictionary attack.

Really should the brute-pressure endeavor be prosperous, it’s adopted by the danger actor deploying other malware, which includes scanners, to scan for other prone systems on the internet.

Exclusively, the scanner is made to look for techniques in which port 22 — which is involved with the SSH assistance — is active and then repeats the method of staging a dictionary attack in buy to put in malware, effectively propagating the infection.

An additional notable element of the attack is the execution of commands these kinds of as “grep -c ^processor /proc/cpuinfo” to identify the selection of CPU cores.

“These resources are believed to have been established by PRG old Group, and each and every danger actor modifies them a bit before working with them in assaults,” ASEC reported, including there is evidence of these kinds of malicious software getting made use of as early as 2021.

To mitigate the challenges affiliated with these attacks, it is suggested that buyers depend on passwords that are difficult to guess, periodically rotate them, and maintain their units up-to-date.

The findings come as Kaspersky unveiled that a novel multi-platform risk identified as NKAbuse is leveraging a decentralized, peer-to-peer network connectivity protocol recognized as NKN (limited for New Variety of Network) as a communications channel for DDoS attacks.

Identified this posting attention-grabbing? Comply with us on Twitter  and LinkedIn to read far more unique information we write-up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Carbanak Banking Malware Resurfaces with New Ransomware Tactics
Next Post: New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor
  • LangSmith Bug Could Expose OpenAI Keys and User Data via Malicious Agents
  • Silver Fox APT Targets Taiwan with Complex Gh0stCringe and HoldingHands RAT Malware
  • Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms
  • Are Forgotten AD Service Accounts Leaving You at Risk?

Copyright © 2025 · AllTech.News, All Rights Reserved.