התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


Systemd as a Weapon: How PumaBot Exploits Linux Persistence
Manage episode 485638913 series 3645080
Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for stealthy persistence.
We dive deep into ATT&CK technique T1501, where systemd services like redis.service or mysqI.service are hijacked or maliciously created to ensure malware survives system reboots. You'll learn how adversaries leverage GoLang’s cross-platform strengths and embed rootkits like pam_unix.so to capture credentials, all while evading detection with environment fingerprinting.
We also explore the broader implications: how cryptojacking continues to rise, what SSH brute-forcing says about current security hygiene, and why IoT devices remain a weak link in enterprise infrastructure. If you manage Linux systems or deploy connected devices, this episode is your tactical briefing on the latest threats—and what to look out for before your CPU cycles are stolen for someone else's crypto wallet.
145 פרקים
Manage episode 485638913 series 3645080
Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for stealthy persistence.
We dive deep into ATT&CK technique T1501, where systemd services like redis.service or mysqI.service are hijacked or maliciously created to ensure malware survives system reboots. You'll learn how adversaries leverage GoLang’s cross-platform strengths and embed rootkits like pam_unix.so to capture credentials, all while evading detection with environment fingerprinting.
We also explore the broader implications: how cryptojacking continues to rise, what SSH brute-forcing says about current security hygiene, and why IoT devices remain a weak link in enterprise infrastructure. If you manage Linux systems or deploy connected devices, this episode is your tactical briefing on the latest threats—and what to look out for before your CPU cycles are stolen for someone else's crypto wallet.
145 פרקים
All episodes
×
1 Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777 38:12

1 GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain 35:21

1 Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk 53:38

1 Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme 50:51

1 Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel 54:53

1 KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed 1:07:13

1 DragonForce Ransomware: The Evolving Threat to Healthcare Data 39:12

1 Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab? 1:02:01

1 SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms 1:03:42

1 TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming 1:01:04

1 Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows 44:04

1 WestJet Cyberattack: Cracks in Aviation’s Digital Armor 25:52

1 Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras 49:37

1 Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists 1:10:32

1 zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security 51:51
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.