Malware found in Linux Servers

Linux Australia has requested his registered attendees of the organization conference of the last three years  to change their Passwords, aimed the possible breach of one of its Servers. The possible leaked information may include the First and Last names, Postal addresses, Emails, Paswards,Cell numbers according to the Linux President Joshua Hesketh.

According to the Linux President Joshua Hesketh the breach occurred on the 22nd March, as a large number of error reporting emails were sent by the Conference Management (Zookeepr) hostingserver. This server hosted the conference systems for linux.conf.au 2013, 2014 and 2015, and for PyCon Australia 2013 and 2014.

Although this breach has not deleted the information of these registered people from the Linux servers but because their passwords has been leaked Linux suggested them to change their passwords especially if they are using the same on their other accounts.

Linux Australia identified the breach after 48 hours after the Linux admins noted that Zookeeper (Conference Management Software) started sending large number of errors in reporting emails. After that they discovered that their server was under attack from 22nd march.

Linux Australia released a statement that ” Linux Australia do not believe this was a targeted attack against the Zookeepr conference management system, nor an attempt to harvest details from the system, we are taking the necessary precautions to review, remediate and minimize the risk of exposure to attacks similar to this.”

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...