
“Until now, publicly known details of the attack were largely limited to its use of a self-injecting rootkit—Phalanx or Phalanx2—to infect kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The malware had access to potentially sensitive information stored on the infected machines. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers. According to Eset, kernel.org servers were probably infected by a second piece of malware dubbed Linux/Ebury, an OpenSSH backdoor used to keep control of the servers and steal credentials.”
Related posts:
US Military Caught Manipulating Social Media, Mass Fake Accounts
An Easy Solution to Owning Gold Offshore In Your IRA
The Private Security Industry In Brazil
Tiny Malaysian Island Quietly Becomes A Favorite New Global Tax Haven
Bitcoin: A Primer for Policymakers
Baidu-owned Hao123 Launches Dedicated Bitcoin News Portal
Twitter IPO filing prompts mistaken buying rush of worthless TWTRQ stock
Feds Expand Definition of "Cash" To Include Stored Value Cards
Russia election interference debunking brings focus back to Seth Rich murder
People Keep Getting Charged With a Crime for Selling Bitcoin
How Much Are the NSA and CIA Front Running Markets?
Dream Chaser flight a 'success' despite gear failure
Cops Barge Into Home, Take Baby After Parents Seek 2nd Medical Opinion
Former Fed Chair: 'We Are Running Out Of Buffer In The Economy'
Mt. Gox and Ripple Founder Jed McCaleb Unveils Project ‘Stellar’