Get a Pentest and security assessment of your IT network.

Cyber Security

Six Malicious Linux Shell Scripts Used to Evade Defenses and How to Stop Them

Uptycs Threat Research outlines how malicious Linux shell scripts are used to cloak attacks and how defenders can detect and mitigate against them. The malicious script disables firewalls, monitoring agents and modifying access control lists (ACLs) Attackers also use the commands to disable non-maskable Interrupt(nmi) and disable iptables rules (iptables -F) The script also disables Linux security modules like SElinux, Apparmor. These modules are designed to implement mandatory access control(MAC) policies.

Source: https://threatpost.com/six-malicious-linux-shell-scripts-how-to-stop-them/168127/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security