Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Linux News Today: XOR DDoS Malware for Linux Attacks Have Been Greatly Exaggerated

Posted on October 1, 2015

Reports have been coming in about a new Trojan malware named XOR DDoS that has been responsible for a number of DDoS attacks in Asia. It’s coming from Linux machines, and people are going wild. The truth is somewhat different from what’s been published until now.

Malware and viruses are not something common in Linux systems, so when someone announces massive 150+ Gbps DDoS attacks that are coming from Linux machines, you take notice. Users from other platforms are now pointing fingers at Linux saying that it’s just as vulnerable as Windows (take a moment here to stop laughing) and that it can cause just as much harm.

DDoS stands for Distributed Denial of Service, and it’s actually pretty easy to understand how it works, despite the jargon being used. A number of computers infected with a trojan attack a single target by sending it a lot of data. This is a Denial of Service, and it makes the life of the victim really difficult. In the case of XOR DDoS, the machines they are attacking are running Linux, which begs the question: how exposed are we? The answer is just as simple. We’re not, or at least the majority of us are not even vulnerable.

There are always a few

In any given numbers of systems, you will find that some of them are not up to date or that they are very old. And old usually means also vulnerable. Dustin Kirkland, a member of the Ubuntu Product and Strategy team from Canonical, explained why Ubuntu systems are not exposed to this problem and what he said applies to a number of other systems like Fedora, openSUSE, Red Hat, and so on.

The XOR DDo malware spreads via Secure Shell (SSH) services susceptible to brute-force attacks due to weak passwords. And that is a dead giveaway about the kind of exposed systems.

“In Ubuntu, we have never in 11 years asked a user to set a root password by default, and as of Ubuntu 14.04 LTS, we now explicitly disable root password logins over SSH. Any Ubuntu machine that might be susceptible to this XOS.DDoS attack, is in a very small minority of the millions of Ubuntu systems in the world,” said Dustin.

So, in order for your Ubuntu (or any other Linux distro) to even become exposed to this malware, you will have to also have SSH root password authentication, a root password, and that password needs to be so simple that it can be revealed by a brute force attack. It’s highly unlikely.

To make things even easier, ClamAV is a free antivirus program that can easily remove the XOS DDoS. So, next time Akamai says something that seems to be apocalyptic about Linux systems being infected, make sure that you have all the facts before getting worried.

Via Softpedia

Terbaru

  • Inilah Syarat Dokumen SSU ITB 2024-2026 yang Wajib Kalian Siapkan Supaya Nggak Gagal Seleksi Administrasi
  • Inilah Episyrphus Balteatus, Lalat Unik Penyamar yang Sangat Bermanfaat bagi Taman Kalian
  • Inilah Cara Lolos Seleksi Siswa Unggul ITB Lewat Jalur Tes Tulis Biar Jadi Mahasiswa Ganesha
  • Inilah Penemuan Fosil Hadrosaurus yang Ungkap Bahwa Penyakit Langka Manusia Sudah Ada Sejak Zaman Prasejarah
  • Inilah Penemuan Terbaru yang Mengungkap Bahwa Sunburn Ternyata Disebabkan Oleh Kerusakan RNA
  • Inilah Alasan Kenapa Manusia Lebih Sering Hamil Satu Bayi daripada Kembar Menurut Penelitian Terbaru
  • Inilah Syarat dan Cara Pendaftaran IMEI Internasional Mulai Mei 2026
  • Bocoran Spek Samsung Galaxy S27 Ultra Nih, Kamera 3X Hilang + Teknologi AI
  • Inilah Perbedaan Motorola G47 dan Motorola G45, Cuma Kamera 108 Megapiksel Doang?
  • Update Baru Google Gemini: Bisa Bikin File Word, PDF, Excel secara Otomatis
  • Rekomendasi Motor Listrik 2026 Anti Mogok!
  • Ini Loh Honda Vision 110, Motor Baru Seharga Beat & Rangka eSAF Khusus Pasar Eropa
  • Inilah Mobil-Mobil Paling Cocok Transisi ke Bioetanol E20 dan Biodiesel B50!
  • Inilah Ternyata Batas Minimal Daya Cas Mobil Listrik di Rumah
  • DJP Geser Batas Akhir Lapor Pajak Sampai 31 Mei 2026
  • PKB Tanggapi Dingin Usul Yusril Ihza Mahendra Soal Parliamentary Treshold 13 Kursi
  • LPTNU Kritik Keras Rencana Penutupan Prodi: Kenapa Tidak Komprehensi & Berbasis Problematika Nyata?
  • Gus Rozin PWNU Jawa Tengah Setuju Cak Imin, Konflik PBNU bikin Warga Kesal dan Tidak Produktif
  • Pengamat: Prabowo Harus Benahi KAI, Aktifkan juga Jalur Kereta Lama & Baru
  • Sekjend PBNU: Jadwal Muktamar Usulan PWNU Sejalan Hasil Rapat Pleno & Rais Aam
  • PKB Desak Hukuman Maksimal Kasus Little Aresha & Evaluasi Total Sistem Penitipan Anak secara Nasional
  • PKB Usul Modernisasi Sistem Kereta dan CCTV di Kabin Masinis, Setuju?
  • Menteri PPA Arifah Fauzi Minta Maaf Soal Polemik Pindah Gerbong Wanita di KRL
  • Cara Kirim Robux Mudah di Roblox Beli Skin Shirt Preview
  • Kronologi kasus dugaan penyebaran konten asusila oleh anak anggota DPRD Kutai Barat?
  • Inilah Alasan Kenapa Gelembung Air di Luar Angkasa Bisa Jadi Eksperimen Fisika yang Keren Banget
  • Inilah Contoh Naskah Doa Upacara Hardiknas 2026 yang Syahdu dan Penuh Makna
  • Inilah 10 Peringkat SMP di Daerah Istimewa Yogyakarta Berdasarkan Hasil TKA TKAD 2025/2026 Terbaru
  • Inilah Cara Download FF Beta Versi Terbaru 2026, Lengkap Dengan Cara Daftar Advanced Server Resmi
  • Inilah Cara Menghilangkan YouTube Shorts di Beranda Biar Nggak Menghambat Scrolling Kalian!
  • How to build a high-performance private photo cloud with Immich and TrueNAS SCALE
  • How to Build an Endgame Local AI Agent Setup Using an 8-Node NVIDIA Cluster with 1TB Memory
  • How to Master Windows Event Logs to Level Up Your Cybersecurity Investigations and SOC Career
  • How to Build Ultra-Resilient Databases with Amazon Aurora Global Database and RDS Proxy for Maximum Uptime and Performance
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Run IBM Granite 4.1 Locally: A Complete Guide to the New Open-Source AI Powerhouse
  • How to Build Claude Code Memory System as Your Second AI Brain
  • How to Analyze Real Estate Like a Pro Using AI Agents (Claude Realtor)
  • How to Use OpenAI Symphony to Automate Your Business Tasks
  • How to Automate Stunning Image Generation with Claude Code and Nano Banana
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme