this post was submitted on 20 Sep 2024
24 points (100.0% liked)

Cybersecurity

5897 readers
44 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 5 comments
sorted by: hot top controversial new old
[–] thoughtfuldragon@lemmy.blahaj.zone 17 points 3 months ago (1 children)

An attacker leveraged wget, curl, tftp, and ftpget commands to download scripts from different sources, including web servers, FTP servers, and even non-standard ports.

Lmao.

[–] undefined@links.hackliberty.org 6 points 3 months ago* (last edited 3 months ago)

non-standard ports

😱

[–] interurbain1er@sh.itjust.works 15 points 3 months ago

root credentials, including common passwords like “root/password” and “root/123456789,”

Elliptical curves ain't gonna fix user stupidity...

[–] blarth@thelemmy.club 4 points 3 months ago* (last edited 3 months ago)

Am I missing it? There’s seemingly no write up on what the vulnerability actually is, they’re essentially just saying that some poorly managed SSH servers get hacked and then the attackers do stuff.

Edit: oops, reread it. Well, this isn’t really a huge surprise. Just terribly simple root credentials and remote root login enabled.

[–] lnxtx@feddit.nl 1 points 3 months ago

Nothing new.