Hackers Can Use OpenSSH to Attack Linux Devices
Hackers Can Use OpenSSH to Attack Linux Devices
- Why Enterprise RAID Rebuilding Succeeds Where Consumer Arrays Fail?
- Linus Torvalds Rejects MMC Subsystem Updates for Linux 7.0: “Complete Garbage”
- The Man Who Maintained Sudo for 30 Years Now Struggles to Fund the Work That Powers Millions of Servers
- How Close Are Quantum Computers to Breaking RSA-2048?
- Why Windows 10 Users Are Flocking to Zorin OS 18 Instead of Linux Mint?
- How to Prevent Ransomware Infection Risks?
- What is the best alternative to Microsoft Office?
Hackers Can Use OpenSSH to Attack Linux Devices, Microsoft Research Shows
News on June 27, Microsoft security department recently released research that hackers are currently using OpenSSH attacks, such attacks are mainly aimed at Linux terminal users .
It is reported that hackers “spread the net” on the Internet, search for Linux devices with incorrect port configurations and low security levels, and after locking them, use brute force to crack the “number calculation” method to invade.
Once the intrusion is successful, the hacker will disable the Shell event recording in the terminal, download the modified OpenSSH file from the hacker’s own server, and then deploy a malicious backdoor program designed with Shell commands, which will automatically detect whether the Honeypot trapping system (Honeypot) environment, so as not to be analyzed by others.

The hacker attack method disclosed by Microsoft Security, the source of the picture is Microsoft Security
Microsoft said that once the victim device is detected by the honeypot trap system, the above-mentioned malicious backdoor program will download the rootkit software Reptile and Diamorphine from GitHub, and deploy the botnet ZiggyStarTux in the compromised Linux device, turning the device into a “broiler”.
Your find the details disclosed by Microsoft here .