Conventional Linux use should be fine. It’s targeting SSH connections to other things over the net; connecting to a server, remote camera, etc. So it reverse engineers the connection by brute-forcing(?) Weak ssh passwords to install the malware.
I’m not an IT professional but this is my layman interpretation.
flyos@jlai.lu 11 months ago
Not particularly security savvy, but :
My understanding is that the worm is targetting connected devices with supidly simple credentials, which is why “Internet-of-Things” is mentioned?
SlopppyEngineer@lemmy.world 11 months ago
Looking at sites like insecam.org, the amount of devices still sett to admin/admin is frighteningly high