Tagged articles
2 articles
Page 1 of 1
ITPUB
ITPUB
Aug 19, 2019 · Information Security

Investigating an SSH Brute‑Force Compromise and Hidden Mining Malware on a Linux Server

A client reported unexpected outbound attack traffic from a server, prompting a step‑by‑step forensic investigation that confirms an SSH brute‑force breach, analyzes logs, identifies malicious network connections and cron jobs, uncovers hidden mining malware, and provides hardening recommendations to secure the Linux host.

ForensicsLinuxSSH brute force
0 likes · 5 min read
Investigating an SSH Brute‑Force Compromise and Hidden Mining Malware on a Linux Server