Главная
Study mode:
on
1
Introduction
2
Operation Wendigo
3
Common Open Stage
4
Deep Analysis
5
Main Features
6
LPG
7
Credentials
8
Main Function
9
Code
10
DNS A
11
Bot Module
12
Miner Module
13
apothecary
14
MITM SSH
15
Demo
16
Backdoor
17
SSH client
18
Command history
19
Back door
20
New sample
21
Basic features
22
SSH password
23
Two passwords
24
Keybased authentication
25
Release infection vectors
26
Check loaded libraries
27
Conclusion
Description:
Explore the dark underbelly of OpenSSH backdoors in this 38-minute conference talk from linux.conf.au. Delve into the analysis of Operation Windigo, a campaign that compromised over 40,000 Linux servers worldwide. Discover the modus operandi of cybercriminals, including their use of the Ebury backdoor to steal login credentials. Learn about the researchers' collection and analysis of hundreds of undocumented malware samples, ranging from basic to advanced implementations with exotic encryption algorithms and anti-logging techniques. Gain insights into the custom honeypot infrastructure used to study attacker behavior, including their pre-deployment checks, installation methods, and lateral movements. Acquire valuable knowledge on preventing such threats and verifying the legitimacy of OpenSSH daemons and clients. This talk provides a comprehensive look at the evolving landscape of OpenSSH-based attacks and offers practical advice for securing Linux systems against these sophisticated threats. Read more

The Dark Side of the ForSSHe

linux.conf.au
Add to list