news
Unpatched (for Years) Systems and "Linux" Gets the Blame
-
LinuxInsider ☛ Linux Patch Blind Spot Exposes Critical Cybersecurity Risks [Ed: Marketing chaff with some slop image]
The Linux server operating system, used globally to power the internet, along with cloud storage, back-end business operations, embedded systems, and high-performance supercomputers, has a tarnished reputation for security and enterprise patch management. Those two Linux security elements represent a significant vulnerability.
-
ZDNet ☛ DripDropper Linux malware cleans up after itself - how it works [Ed: Don't install it. The real issue here is unpatched Apache ActiveMQ in some scenarios.]
The security company Red Canary has detected an attacker exploiting Apache ActiveMQ, a popular open-source message broker, security hole CVE-2023-46604, to gain persistent access on cloud Linux systems. So far, so much villainy as usual. Where DripDropper changes the game is that, once it's in, it patches the security hole behind it.
-
Hacker News ☛ Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems [Ed: This is years old. This is neglect by those impacted, not Linux.]
Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain persistent access to cloud Linux systems and deploy malware called DripDropper. [...] It was addressed in late October 2023.