15

http://www.us-cert.gov

US-CERT is aware of active attacks against linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as "phalanx2" is installed.

Full story »
akf's picture
Created by akf 5 years 48 weeks ago – Made popular 5 years 48 weeks ago
Category: High End   Tags: