>Linux doesn't get mal...

>Linux doesn't get mal...
Hahahahaha freetards BTFO!!!

Beware Cat Shirt $21.68

Rise, Grind, Banana Find Shirt $21.68

Beware Cat Shirt $21.68

  1. 2 months ago
    Anonymous

    B-but I'm more secure because many many many eyes are pouring all over my source!
    >Dies of a Heart Bleed.

    • 2 months ago
      Anonymous

      >no security updates like winblows or mactoddler machines
      >can't have quick fixes to cyber attacks the same speed like other platforms
      Freetards unironically will never recover from these

      Spotted the 12 year olds

    • 2 months ago
      Anonymous

      Linuxtards surprised that people actually target their OS now more than 2 people including themselves actually give a shit about it. The protection of insignificance only works when you’re insignificant. People didn’t attack Windows because it was weak/flawed, they attacked it because it was worthwhile.

      Open source acts like it’s free market capitalism, which is a on-paper concept. In reality it’s a gamble if (in order):
      >People see the code
      >People can read the code
      >People can understand the code
      >People can fix the code (or report the issue)
      >People can be asked to fix the code
      >If the code can be fixed properly

      The reason closed source does well is normally it’s for business reasons and to make money, in which they hire proper engineers to resolve issues.

      There’s a massive difference between incentivised/paid and qualified engineers in proper structure, versus hoping some moronic teenage pajeet notices an issue in your code and fixes it in a homielicious way so he can say on his portfolio he helped build Linux, the two are simply different ballparks

  2. 2 months ago
    Anonymous

    >no security updates like winblows or mactoddler machines
    >can't have quick fixes to cyber attacks the same speed like other platforms
    Freetards unironically will never recover from these

    • 2 months ago
      Anonymous

      Nice lie. Rhel can update the kernel without rebooting for security fixes.

      • 2 months ago
        Anonymous

        And worth noting that OpenSSH is not built by or maintained by Linux devs. That's the BSD people. OpenSSH and its default configurations should be taken up with them. Maybe ask them to add a built in config checker that prints annoying ASCII art if less than sane options are set.

        • 2 months ago
          Anonymous

          We just need field marshal torvalds back to hyperbole people back to competence

      • 2 months ago
        Anonymous

        >Rhel
        Sup corpo paypig? Better use windows for less corpo experiment

    • 2 months ago
      Anonymous

      Linux patched intel-aviv's backdoor heartbleed and spectre bugs before windows did.

      • 2 months ago
        Anonymous

        >intel-aviv's backdoor
        There was actual proofs that the Mossad was involved in this?

  3. 2 months ago
    Anonymous

    Nice thread.

  4. 2 months ago
    Anonymous

    >noabot

    • 2 months ago
      Anonymous

      she is a child

      • 2 months ago
        Anonymous

        she is a worm robot that has infected your linus

      • 2 months ago
        Anonymous

        It's a drawing, schizo. Learn to differentiate reality from computer screen.

        • 2 months ago
          Anonymous

          Reminder

          • 2 months ago
            Anonymous

            you just killed that guy are you insane??????

          • 2 months ago
            Anonymous

            Just called the police on you for murder

          • 2 months ago
            Anonymous

            Guys treating real people like fictional characters and fictional character like they were real people and he's the one calling you insane

      • 2 months ago
        Anonymous

        I don't care, because drawings are still legal.

      • 2 months ago
        Anonymous

        Out of ten!

  5. 2 months ago
    Anonymous
  6. 2 months ago
    Anonymous

    >NoaBot

  7. 2 months ago
    Anonymous

    Every article ever, written about a "Linux worm" has never been a Linux worm. It's been some poorly coded application and/or poorly configured sshd that is exposed to the public by someone not qualified to do so. To my knowledge there has never been a "Linux worm" but this is a good troll thread nonetheless. B+

    • 2 months ago
      Anonymous

      >Real Communism has never been tried.

      • 2 months ago
        Anonymous

        There are two options really, either it was tried and it work or it hasn't been tried yet, same with GNU/Linux

    • 2 months ago
      Anonymous

      "It's a wormable self-spreader with an SSH key backdoor."

      • 2 months ago
        Anonymous

        So not Linux

  8. 2 months ago
    Anonymous

    NOABOT!!!!!!!!!1

  9. 2 months ago
    Anonymous

    >NoaBot targets weak passwords connecting SSH connections

    • 2 months ago
      Anonymous

      > allow password login over ssh
      … does any skilled person realy?

      • 2 months ago
        Anonymous

        I dunno, I always use a key to authenticate, but then again, I've seen ssh keys, passwords, all that hard coded in source people have uploaded. This is something that will always affect systems that multiple people use, because people hire idiots.

      • 2 months ago
        Anonymous

        Very doable with a good password and brute force mitigations such as fail2ban. Brute forcing still happens because tons of dumb corpos and shitty IT MSPs full of idiots love easy passwords and convenience.

    • 2 months ago
      Anonymous

      sexo

    • 2 months ago
      Anonymous

      I want to kiss her cute little butt.

  10. 2 months ago
    Anonymous

    >The worm is a customized version of Mirai, the botnet malware that infects Linux-based servers, routers, web cameras, and other so-called Internet of Things devices.
    Everybody already knows that malware targets linux servers and "internet of things". Servers since they are powerful and are often connected to many other computers, often even distributed and internet of shit since those devices are never updated.

  11. 2 months ago
    Anonymous

    Linuxsisters... I thought open source meant that well-meaning devs would find and fix all vulnerabilities before le bad guys could abuse them??

    • 2 months ago
      Anonymous

      Open source can't force people to be competent and configure things correctly.

  12. 2 months ago
    Anonymous

    hot

  13. 2 months ago
    Anonymous

    >servers and IoT shit
    The average desktop user should be fine, right?

    • 2 months ago
      Anonymous

      Any desktop including Mac, Windows and whatever could be running sshd. Just make sure it's properly configured using the myriad of examples online or disable it. Some companies will enable this on Mac and Windows for admins to hop it and debug things.

    • 2 months ago
      Anonymous

      > https://www.akamai.com/blog/security-research/mirai-based-noabot-crypto-mining
      > The malware’s method of lateral movement is via plain old SSH credentials dictionary attacks.
      It's nothing particularly interesting. As long as you don't expose services to the internet or you use reasonable credentials you should be fine.

  14. 2 months ago
    Anonymous
    • 2 months ago
      Anonymous

      Noakadashi

  15. 2 months ago
    Anonymous

    samples?

    • 2 months ago
      Anonymous

      so far we know that it's a very cute and funny bot

  16. 2 months ago
    Anonymous

    brainlet post, linux runs the majority of web servers, and servers in general, off course it is going to be a target
    and water is wet, more news at eleven

    • 2 months ago
      Anonymous

      >water is wet
      opinion discarded

  17. 2 months ago
    Anonymous

    linux users as usual already posting pedophile shit to divert from their shit OS

    • 2 months ago
      Anonymous

      More trollin, but lower quality. C- OpenSSH and its defaults are managed by BSD developers.

  18. 2 months ago
    Anonymous

    >We’ve also seen the addition of command line arguments over time. The most interesting one is the “noa” flag, which made the botnet install a persistence method in the form of a crontab entry to run after a reboot.
    >Coincidentally, it seems this flag was heavily used in the wild, as some of the antivirus detections for botnet samples had the prefix “Noa-”.

    From the Akamaiorita blog: https://www.akamai.com/blog/security-research/mirai-based-noabot-crypto-mining

  19. 2 months ago
    Anonymous

    >shell script that tries common passwords
    doesn't count
    a worm has to exploit a vulnerability

    • 2 months ago
      Anonymous

      Well morons who use dictionary passwords for secure logins are a vulnerability. Every Raspberry Pi with ssd and every moron using "password" as their passphrase because:
      >hurr durr nobody is going to hack a raspberry pi
      So anything running say octoprint now becomes a part of the botnet.

      • 2 months ago
        Anonymous

        Not ssd, ssh. Sorry phone posting from the toilet at work. We got infected by the worm and we have to basically format everything and restore from backups made 2 weeks ago. It's going to cost the company millions of dollars.

        • 2 months ago
          Anonymous

          >from the toilet at work.
          A street isn't a toilet Rajeesh.

  20. 2 months ago
    Anonymous

    AND HES THE FUNKIEST WORM IN THE WOOORLD

  21. 2 months ago
    Anonymous

    >If somebody has a direct connection to your node and you have password logins enabled and that password is weak... guess what, you just pwnd!!
    too shit to even be a CV padding fluff piece

    • 2 months ago
      Anonymous

      Establishing a direct connection is easy. Most ssh installments use passwords. Most businesses use dictionary passwords for ease of use. You must be 18 years or older to post here.

      • 2 months ago
        Anonymous

        >Most businesses use dictionary passwords for ease of use
        They deserve to be pwned then.

      • 2 months ago
        Anonymous

        stop larping you clueless moron
        You get thousands of chinks, russians and other morons probing servers for easy SSH ports every hour of the day, literally nobody keeps their shit directly exposed and even less with passwords, let alone simple ones

        Go get a job and then ask your network guys to show you some logs

        • 2 months ago
          Anonymous

          > no one
          > your network guys
          Decently sized companies with IT teams usually do reasonable things. I only did consulting for for 3 years, but some of the shit you see from smaller companies is wild. This was before 2020, so I can imagine it only got worse during remote work. Not to mention the pwned boxes (not just honeypots) could just be VMs rented out as seedboxes configured by as babby's first linux..

        • 2 months ago
          Anonymous

          Well maybe if Linux wasnt so insecure it wouldn't have this problem.

        • 2 months ago
          Anonymous

          >literally nobody keeps their shit directly exposed and even less with passwords
          How cute, you live in a fantasy world without idiots. There is a reason these servers get owned by bots.

        • 2 months ago
          Anonymous

          >literally nobody keeps their shit directly exposed
          (Yes I am a moron new to all of this) Is this when servers do things like not directly expose common ports like 443, 22 80 etc. and instead use reverse proxies?

  22. 2 months ago
    (。>﹏<。)

    bumo

  23. 2 months ago
    Anonymous

    >easy to guess password
    >no firewall
    >gets pwd
    Chinese have been doing this for decades, it's literally no different.
    Use strong passwords or keys, ret/a/rds.

  24. 2 months ago
    Anonymous

    >NoaBot
    >Crypto
    >Botnet
    >Linux
    So which one of you did this?

    • 2 months ago
      Anonymous

      yeah there's no way this wasn't a IQfyentooman having a giggle

  25. 2 months ago
    Anonymous

    glowie poster

  26. 2 months ago
    Anonymous

    noabot

  27. 2 months ago
    Anonymous

    Linux moment

  28. 2 months ago
    Anonymous

    will windows defender through wine stop it? Mcafee?

  29. 2 months ago
    Anonymous

    >Linux doesn't get malware
    Said no one.

    • 2 months ago
      Anonymous

      >Nobody bothers to write malware to linux
      This was repeated through 2005 to 2015. Now it starts to be really profitable and easier to do so!

  30. 2 months ago
    Anonymous

    noa is finally technology

    • 2 months ago
      Anonymous

      always has been

  31. 2 months ago
    Anonymous

    >ssh defaults
    >bruteforce attack
    The only interesting thing about this is the rust code.
    Meanwhile exchange servers fricked in the ass on daily basis.
    morons are everywhere, including you.

  32. 2 months ago
    Anonymous

    >linux malware so uncommon its newsworthy

Comments are closed.