Enlarge (credit: BeeBright / Getty Images / iStockphoto) Infrastructure used to maintain and distribute the Linux operating system kernel was infected for two years, starting in 2009, by sophisticated malware that managed to get a hold of one of the developers’ most closely guarded resources: the /etc/shadow files that stored encrypted password data for more than 550 system users, researchers said Tuesday. The unknown attackers behind the compromise infected at least four servers inside kernel.org, the Internet domain underpinning the sprawling Linux development and distribution network, the researchers from security firm ESET said.

Topics:  enlarge   beebright    getty images   infrastructure   linux   eset   stealing   read   comments   maintainers   infected   years   attackers   servers   kernel.org   system   network   kernel   researchers   malware   domain   managed   accounts   
BING NEWS:
  • Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach
    Infrastructure used to maintain and distribute the Linux operating system kernel was infected for two years, starting in ... when kernel maintainers revealed that 448 accounts had been compromised ...
    05/14/2024 - 10:56 pm | View Link
  • More

 

Welcome to Wopular!

Welcome to Wopular

Wopular is an online newspaper rack, giving you a summary view of the top headlines from the top news sites.

Senh Duong (Founder)
Wopular, MWB, RottenTomatoes

Subscribe to Wopular's RSS Fan Wopular on Facebook Follow Wopular on Twitter Follow Wopular on Google Plus

MoviesWithButter : Our Sister Site

More Business News