Spam malware has infected thousands of Linux and FreeBSD system servers
According to the latest 23-page Security Report published by the anti-virus provider Eset, thousands of Linux and FreeBSD operating system-based servers have been infected with Mumblehard malware in the past seven months, and quietly use some of the server's resources to send spam. In the past seven months, one of the instructions and Control Channels monitored has connected 8867 independent IP addresses, 3000 of which were added in the past three weeks.
Mumblehard is developed by experienced and highly skilled programmers. It contains backdoors and spam daemon and sends large batches of spam through background processes. This malicious program is written in the Perl programming language. It has two important components that are encapsulated in a customized "package" and uses natural machine code to call hardware resources through low-level programming languages. Security researchers said malware also has a common proxy
Mumblehard is developed by experienced and highly skilled programmers. It contains backdoors and spam daemon and sends large batches of spam through background processes. This malicious program is written in the Perl programming language. It has two important components that are encapsulated in a customized "package" and uses natural machine code to call hardware resources through low-level programming languages. Security researchers said that malware also has the ability to act as a common proxy and only communicates with the command and control server on the listening socket. You can add multiple hosts to a whitelist.
This article permanently updates the link address: