• sunbeam60@lemmy.one
    link
    fedilink
    English
    arrow-up
    0
    ·
    18 days ago

    Luckily I sit right next to my home server and can hear when the fans kick in under load. The absence of noise tells me I don’t have thus problem :)

  • li10@feddit.uk
    link
    fedilink
    English
    arrow-up
    0
    ·
    19 days ago

    Sounds like it should at least be noticeable if you monitor resource usage?

    • cron@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      18 days ago

      Yes, but they replace common tools like top or lsof with manipulated versions. This might at least trick less experienced sysadmins.

      Edit: Some found out about the vulnerability by ressource alerts. Probably very easy in a virtualized environment. The malware can’t fool the hypervisor ;)

      • li10@feddit.uk
        link
        fedilink
        English
        arrow-up
        0
        ·
        18 days ago

        Not quite the monitoring I’m talking about though.

        Basically, it seems like this would be a nightmare for a home user to detect, but a company is probably gonna pick up on this quite quickly with snmp monitoring (unless it somehow does something to that).

  • zante@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    0
    ·
    19 days ago

    No mention of transmission methods as far as I understand the article

    • JohnnyCanuck@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      18 days ago

      They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.

  • luciddaemon@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    18 days ago

    Seeing the diagram, it only attacks servers with misconfigured rocketMQ or CVE-2023-33426, which is already patched. Am I understanding this correctly?

    • cron@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      18 days ago

      It probably has a large database of exploits it can use. The article claims 20k, but this seems to high for me.