Tagged articles
1 articles
Page 1 of 1
ITPUB
ITPUB
Jul 20, 2016 · Information Security

Dissecting the XOR.DDoS Linux Trojan: Sample, Crontab Abuse, and Defense Steps

This article examines the XOR.DDoS Linux trojan (sample 101), detailing how it hijacks crontab to launch malicious scripts, the forensic clues left in system logs, and a step‑by‑step emergency removal procedure, while also discussing its polymorphic nature and the broader challenges of defending against such malware.

Defense StrategiesLinux trojanXOR.DDoS
0 likes · 10 min read
Dissecting the XOR.DDoS Linux Trojan: Sample, Crontab Abuse, and Defense Steps