this post was submitted on 20 Sep 2024
24 points (100.0% liked)

Cybersecurity

5931 readers
25 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
top 5 comments
sorted by: hot top controversial new old
[–] [email protected] 17 points 3 months ago (1 children)

An attacker leveraged wget, curl, tftp, and ftpget commands to download scripts from different sources, including web servers, FTP servers, and even non-standard ports.

Lmao.

[–] [email protected] 6 points 3 months ago* (last edited 3 months ago)

non-standard ports

😱

[–] interurbain1er 15 points 3 months ago

root credentials, including common passwords like “root/password” and “root/123456789,”

Elliptical curves ain't gonna fix user stupidity...

[–] [email protected] 4 points 3 months ago* (last edited 3 months ago)

Am I missing it? There’s seemingly no write up on what the vulnerability actually is, they’re essentially just saying that some poorly managed SSH servers get hacked and then the attackers do stuff.

Edit: oops, reread it. Well, this isn’t really a huge surprise. Just terribly simple root credentials and remote root login enabled.

[–] [email protected] 1 points 3 months ago

Nothing new.