New P2P botnet infects SSH servers all over the world:
Researchers have found what they believe is a previously undiscovered botnet that uses unusually advanced measures to covertly target millions of servers around the world.
The botnet uses proprietary software written from scratch to infect servers and corral them into a peer-to-peer network, researchers from security firm Guardicore Labs reported on Wednesday. P2P botnets distribute their administration among many infected nodes rather than relying on a control server to send commands and receive pilfered data. With no centralized server, the botnets are generally harder to spot and more difficult to shut down.
"What was intriguing about this campaign was that, at first sight, there was no apparent command and control (CNC) server being connected to," Guardicore Labs researcher Ophir Harpaz wrote. "It was shortly after the beginning of the research when we understood no CNC existed in the first place."
(Score: 2) by RS3 on Tuesday August 25 2020, @05:03AM
I'm not sure if you disagreed, but mostly augmented, and thanks. I'm not sure if OS/distroSSHserver matters(?). I didn't gather that it's a software bug, but just guessing and finding a weak password that causes the problem.
However, if you read the comment / Q&A at the bottom you'll see fail2ban mentioned, and how it's not going to be very effective due to the many different source IP addresses.