Get a Pentest and security assessment of your IT network.

Cyber Security

Six Malicious Linux Shell Scripts Used to Evade Defenses and How to Stop Them

Uptycs Threat Research outlines how malicious Linux shell scripts are used to cloak attacks and how defenders can detect and mitigate against them. The malicious script disables firewalls, monitoring agents and modifying access control lists (ACLs) Attackers also use the commands to disable non-maskable Interrupt(nmi) and disable iptables rules (iptables -F) The script also disables Linux security modules like SElinux, Apparmor. These modules are designed to implement mandatory access control(MAC) policies.

Source: https://threatpost.com/six-malicious-linux-shell-scripts-how-to-stop-them/168127/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation