Lazy Linux sysadmins make systems insecure

    Date05 Oct 2009
    CategoryHacks/Cracks
    5191
    Posted ByAnthony Pell
    SOME LAZY Linux administrators are living in a dreamworld where they believe their systems are secure just because they use Linux, according to an insecurity expert. Peter Hansteen claims that a third round of low-intensity, distributed bruteforce password attacks is now in progress because of sloppy admin practices on Linux systems. So far about a thousand servers have been compromised. Writing in his blog, Hansteen said that many systems administrators seem to believe that they cannot be attacked successfully because they are not running a bug-ridden proprietary operating system.

    He said the latest wave of attacks is quite easy to stop, if systems admins pay attention.

    The likely culprit is a piece of Linux malware known as dt_ssh5.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.