“Until now, publicly known details of the attack were largely limited to its use of a self-injecting rootkit—Phalanx or Phalanx2—to infect kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The malware had access to potentially sensitive information stored on the infected machines. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers. According to Eset, kernel.org servers were probably infected by a second piece of malware dubbed Linux/Ebury, an OpenSSH backdoor used to keep control of the servers and steal credentials.”
(Visited 37 times, 1 visits today)
Related posts:
How nonprofits spend millions on elections and call it public welfare
No way out: Julian Assange marks one year inside Ecuadorian embassy in UK
Another Reason to Keep Your Children Away from Government Schools
IRS office under scrutiny for targeting tea party groups also disclosed confidential info
How to Steal an Airplane: From 9/11 to MH370 [2014]
U.S. Inflation Since 1775 And How It Took Off In 1933
Next Generation 3-D Printed Gun Fires Nine Shots, Costs $25
Activists file first lawsuit over "Ag Gag" industrial filming law
South African rand crashes as 'affirmative action' mining charter introduced
America's Allies Feed Christians to the Dogs
Romney’s Big Navy Guru Made Millions From Building Ships
Crisis and Opportunities: An Elliott Wave Overview of the Markets
Swiss Gold Initiative Likely Tighter Than Polls Suggest
Supreme Court Refuses To Review 'Knock-and-Talk' Police Killings
Obama Meets Privately with Energy Industry CEOs