March 7, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

Hackers Can Use OpenSSH to Attack Linux Devices

Hackers Can Use OpenSSH to Attack Linux Devices



 

Hackers Can Use OpenSSH to Attack Linux Devices, Microsoft Research Shows

 

News on June 27, Microsoft security department recently released research that hackers are currently using OpenSSH attacks, such attacks are mainly aimed at Linux terminal users .

 

It is reported that hackers “spread the net” on the Internet, search for Linux devices with incorrect port configurations and low security levels, and after locking them, use brute force to crack the “number calculation” method to invade.

 

Once the intrusion is successful, the hacker will disable the Shell event recording in the terminal, download the modified OpenSSH file from the hacker’s own server, and then deploy a malicious backdoor program designed with Shell commands, which will automatically detect whether the Honeypot trapping system (Honeypot) environment, so as not to be analyzed by others.

 

Hackers Can Use OpenSSH to Attack Linux Devices

The hacker attack method disclosed by Microsoft Security, the source of the picture is Microsoft Security

 

 

Microsoft said that once the victim device is detected by the honeypot trap system, the above-mentioned malicious backdoor program will download the rootkit software Reptile and Diamorphine from GitHub, and deploy the botnet ZiggyStarTux in the compromised Linux device, turning the device into a “broiler”.

 

Your find the details disclosed by Microsoft here .

 

 

Hackers Can Use OpenSSH to Attack Linux Devices


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.