ITPUB
Jul 20, 2016 · Information Security
Dissecting the XOR.DDoS Linux Trojan: Sample, Crontab Abuse, and Defense Steps
This article examines the XOR.DDoS Linux trojan (sample 101), detailing how it hijacks crontab to launch malicious scripts, the forensic clues left in system logs, and a step‑by‑step emergency removal procedure, while also discussing its polymorphic nature and the broader challenges of defending against such malware.
Defense StrategiesLinux trojanXOR.DDoS
0 likes · 10 min read
