You must log in or # to comment.
An attacker leveraged wget, curl, tftp, and ftpget commands to download scripts from different sources, including web servers, FTP servers, and even non-standard ports.
Lmao.
non-standard ports
😱
root credentials, including common passwords like “root/password” and “root/123456789,”
Elliptical curves ain’t gonna fix user stupidity…
Am I missing it? There’s seemingly no write up on what the vulnerability actually is, they’re essentially just saying that some poorly managed SSH servers get hacked and then the attackers do stuff.
Edit: oops, reread it. Well, this isn’t really a huge surprise. Just terribly simple root credentials and remote root login enabled.
Nothing new.