New P2P botnet infects SSH servers all over the world:
Researchers have found what they believe is a previously undiscovered botnet that uses unusually advanced measures to covertly target millions of servers around the world.
The botnet uses proprietary software written from scratch to infect servers and corral them into a peer-to-peer network, researchers from security firm Guardicore Labs reported on Wednesday. P2P botnets distribute their administration among many infected nodes rather than relying on a control server to send commands and receive pilfered data. With no centralized server, the botnets are generally harder to spot and more difficult to shut down.
"What was intriguing about this campaign was that, at first sight, there was no apparent command and control (CNC) server being connected to," Guardicore Labs researcher Ophir Harpaz wrote. "It was shortly after the beginning of the research when we understood no CNC existed in the first place."
(Score: 4, Funny) by DannyB on Monday August 24 2020, @03:54PM (7 children)
Telnet runs on a different port than SSH. Whey the attacker sees that SSH port does not respond, they would never think to try Telnet.
Thus: Telnet is more secure.
To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.
(Score: 2) by arslan on Monday August 24 2020, @11:00PM (4 children)
To be "triply" secure I use rsh just in case they the attacker thinks of Telnet.
(Score: 2) by FatPhil on Tuesday August 25 2020, @04:12AM (3 children)
For an extra layer of security, I've randomly shuffled my keycaps.
Checkmate, wannabe-hackers!
Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
(Score: 2) by DannyB on Tuesday August 25 2020, @01:18PM (2 children)
If you are attempting to protect the secrecy of your password, I have a better bestest practice.
Simply wear the T-shirt inside out. Nobody can see the password. Problem solved.
To transfer files: right-click on file, pick Copy. Unplug mouse, plug mouse into other computer. Right-click, paste.
(Score: 0) by Anonymous Coward on Tuesday August 25 2020, @06:17PM (1 child)
Make sure the password is upside down. That way no one can read it. Turn it right side up when needed.
(Score: 2) by arslan on Tuesday August 25 2020, @11:22PM
Eh? Weak sauce. I tattoo it flipped along the vertical axis so no can read it except for myself when I'm looking in the mirror.
(Score: 2) by driverless on Tuesday August 25 2020, @04:53AM (1 child)
I use a an even more secure proximity-based biometrically-authenticated distance-bounded airgapped protocol:
(Score: 0) by Anonymous Coward on Tuesday August 25 2020, @03:19PM
I use a an even more secure proximity-based biometrically-authenticated distance-bounded airgapped alcohol:
There, FTFY.