Cybersecurity and Linux SSH Servers
- Dr. Jane LeClair
- Apr 19, 2024
- 1 min read
Updated: Jun 25, 2024
Linux SSH Servers as Viable Targets
by Charles Parker, II
Cybersecurity is such an interesting field. Just when you have the vulnerabilities figured out, the environment changes. This dynamic feature keeps everything on a pivot.
One of the newer focal points for attacks are the Linux SSH servers. These are garnering more attention lately. SSH is commonly used, which provides for a set of targets to try. The method for this attack is for the bad actor to install port scanners and tools for dictionary attacks. With this in place, the compromised servers would be used in attacks to compromise other servers. These would then be used for cryptocurrency mining and DDoS attacks.
This shows the need to address SSH server vulnerabilities, update the versions, and monitor these. Without the attentiveness, the vulnerabilities continue to be available to be exploited. The interesting piece of this is the exploit isn’t a one-off. With the compromised servers infecting others, this becomes exponential. Addressing this removes one more area attackers can test.
Thank you.
Recent Posts
See AllIt’s not safe to go to meetings anymore! by Charles Parker, II Meetings on Teams or any other tool have become a requirement. Pre-COVID...
FDA Ramping Up Cybersecurity Compliance by Charles Parker, II On October 1, 2023 the FDA enacted the Cybersecurity Refuse to Accept (RTA)...
Wells Fargo has a bad day Charles Parker, II Wells Fargo is a large international bank. They have over 70M customers worldwide and...
Comments