Cybersecurity is such an interesting field. Just when you
have the vulnerabilities figured out, the environment changes. This dynamic
feature keeps everything on a pivot.
One of the newer focal points for attacks are the Linux SSH
servers. These are garnering more attention lately. SSH is commonly used, which
provides for a set of targets to try. The method for this attack is for the bad
actor to install port scanners and tools for dictionary attacks. With this in
place, the compromised servers would be used in attacks to compromise other
servers. These would then be used for cryptocurrency mining and DDoS attacks.
This shows the need to address SSH server vulnerabilities,
update the versions, and monitor these. Without the attentiveness, the
vulnerabilities continue to be available to be exploited. The interesting piece
of this is the exploit isn’t a one-off. With the compromised servers infecting others,
this becomes exponential. Addressing this removes one more area attackers can
test.
Thank you.
Services
Enterprise and Embedded System Cybersecurity Engineering & Architecture
Red Team Pentesting | HW & SW BoMs | CBoM |
Vulnerability Management | Tabletop Exercises (TTX) |
Embedded Systems Architecture | Threat Intelligence |
TARA (Threat Assessment and Remediation Analysis)
Disabled Veteran Owned and Operated
No comments:
Post a Comment