An active financially motivated campaign is targeting vulnerable SSH servers to covertly ensnare them into a proxy network.
Unlike cryptojacking, in which the resources are used to illicitly mine cryptocurrency, proxyjacking offers the ability for threat actors to leverage the victim’s unused bandwidth to secretly run different services as a P2P node.
The company warns that Standard security practices remain an effective prevention mechanism, including strong passwords, patch management, and meticulous logging.
An further examination of the web server has revealed that it’s also being used to host a cryptocurrency miner, suggesting that the threat actors are dabbling in both cryptojackings and proxyjacks attacks.
The company recommends that end-users implement strong password protection and use logging to manage their networks.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply