this post was submitted on 20 Sep 2024
24 points (100.0% liked)

Cybersecurity

8582 readers
466 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
top 5 comments
sorted by: hot top controversial new old
[–] thoughtfuldragon@lemmy.blahaj.zone 17 points 1 year ago (1 children)

An attacker leveraged wget, curl, tftp, and ftpget commands to download scripts from different sources, including web servers, FTP servers, and even non-standard ports.

Lmao.

[–] undefined@links.hackliberty.org 6 points 1 year ago* (last edited 1 year ago)

non-standard ports

😱

[–] interurbain1er@sh.itjust.works 15 points 1 year ago

root credentials, including common passwords like “root/password” and “root/123456789,”

Elliptical curves ain't gonna fix user stupidity...

[–] blarth@thelemmy.club 4 points 1 year ago* (last edited 1 year ago)

Am I missing it? There’s seemingly no write up on what the vulnerability actually is, they’re essentially just saying that some poorly managed SSH servers get hacked and then the attackers do stuff.

Edit: oops, reread it. Well, this isn’t really a huge surprise. Just terribly simple root credentials and remote root login enabled.

[–] lnxtx@feddit.nl 1 points 1 year ago

Nothing new.