Malware found in Linux Servers

Linux Australia has requested his registered attendees of the organization conference of the last three years  to change their Passwords, aimed the possible breach of one of its Servers. The possible leaked information may include the First and Last names, Postal addresses, Emails, Paswards,Cell numbers according to the Linux President Joshua Hesketh.

According to the Linux President Joshua Hesketh the breach occurred on the 22nd March, as a large number of error reporting emails were sent by the Conference Management (Zookeepr) hostingserver. This server hosted the conference systems for 2013, 2014 and 2015, and for PyCon Australia 2013 and 2014.

Although this breach has not deleted the information of these registered people from the Linux servers but because their passwords has been leaked Linux suggested them to change their passwords especially if they are using the same on their other accounts.

Linux Australia identified the breach after 48 hours after the Linux admins noted that Zookeeper (Conference Management Software) started sending large number of errors in reporting emails. After that they discovered that their server was under attack from 22nd march.

Linux Australia released a statement that ” Linux Australia do not believe this was a targeted attack against the Zookeepr conference management system, nor an attempt to harvest details from the system, we are taking the necessary precautions to review, remediate and minimize the risk of exposure to attacks similar to this.”

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...