this post was submitted on 09 Mar 2024
1051 points (94.6% liked)

Technology

59575 readers
3115 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Microsoft, doing it's part to make the world a better place.

you are viewing a single comment's thread
view the rest of the comments
[–] SnotFlickerman@lemmy.blahaj.zone 3 points 8 months ago* (last edited 8 months ago)

Yeah, because botnets are made from consumer-level machines that are badly secured.

So some idiot who knows nothing about Linux sets it up the first time, never create an account other than the root account, never enabled UFW, and browses all day is literally the kind of people who make botnets are looking for to target. They don't target Linux for these because it's such a small market share in the consumer-desktop market.

Corporate servers tend to actually have competent security people running them, which is why you don't see constant breaches of Linux servers, although it happens. Even then, corporate servers can be hacked if the services running on them aren't appropriately patched. The Equifax hack is a great example of this, a series of cascading failures, and the CVE relating to it touched on that it was an Apache exploit that could work in either Windows or Linux.

https://isc.sans.edu/diary/22169

The exploit should work on Windows and Linux. It tests which operating system it runs on via "@java.lang.System@getProperty('os.name')". It it runs on Windows, then it will execute cmd.exe /c followed by a command (highlighted in red in above's sample). One Unix, it will execute /bin/bash -c followed by the same command.

Pro-tip: Cybersecurity is hard, and expecting random asshats who've never had any training figure out on the go is asking for a bad time.