Sujet : Re: Malware find in the news: xz related.
De : rich (at) *nospam* example.invalid (Rich)
Groupes : comp.os.linux.miscDate : 01. Apr 2024, 15:03:15
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <uueer2$2h6d2$1@dont-email.me>
References : 1 2 3 4 5 6 7 8 9
User-Agent : tin/2.6.1-20211226 ("Convalmore") (Linux/5.15.139 (x86_64))
Carlos E.R. <
robin_listas@es.invalid> wrote:
On 2024-03-31 23:37, Richard Kettlewell wrote:
Incredibly good luck that it was spotted before it was too widely
deployed. Or bad luck if you were the originator l-)
I saw a post (es.comp.os.linux.redes) of someone in which the sshd
had weird peaks of high cpu (40%)
The individual who discovered the backdoor was doing some kind of
performance testing of PostgreSQL. Because of that they were
monitoring their system's processe's usage and noticed unusual CPU
usage from sshd. When they started digging into why sshd was spiking
CPU usage (because it was messing with their PostgreSQL performance
monitoring) they discovered the sshd backdoor.