Tag

server compromise

1 views collected around this technical thread.

Efficient Ops
Efficient Ops
Aug 3, 2021 · Information Security

How a Compromised Server Was Hijacked: Inside the gpg-agentd Malware Attack

This article walks through a real‑world server breach where a disguised gpg‑agentd process was used to install backdoors, download malicious scripts, exploit Redis, and launch mass scans, and then offers concrete hardening steps to prevent similar compromises.

gpg-agentdmalware analysismasscan
0 likes · 12 min read
How a Compromised Server Was Hijacked: Inside the gpg-agentd Malware Attack
Efficient Ops
Efficient Ops
Nov 22, 2020 · Information Security

Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack

This article walks through a real‑world compromise of an Alibaba Cloud server, detailing how a disguised gpg‑agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning with malicious scripts, and it concludes with practical hardening recommendations.

gpg-agentdmalware analysismasscan
0 likes · 15 min read
Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack
Efficient Ops
Efficient Ops
Apr 7, 2020 · Information Security

How to Detect and Remediate a Linux Rootkit Attack: A Step‑by‑Step Case Study

This article walks through a real‑world Linux server compromise, detailing the symptoms, forensic commands, rootkit discovery, attack vector via an Awstats vulnerability, and provides a comprehensive recovery checklist for securing the system.

Rootkitawstatsincident response
0 likes · 13 min read
How to Detect and Remediate a Linux Rootkit Attack: A Step‑by‑Step Case Study
Efficient Ops
Efficient Ops
May 20, 2019 · Information Security

How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server

After a routine morning, the author discovers an Alibaba Cloud server frozen due to malicious outbound traffic, then traces a sophisticated malware chain involving a disguised gpg-agentd process, malicious cron jobs, compromised SSH keys, Redis exploitation, and mass scanning, culminating in detailed forensic analysis and security recommendations.

cron jobsgpg-agentdmalware analysis
0 likes · 13 min read
How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server
Efficient Ops
Efficient Ops
Jan 29, 2019 · Information Security

How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough

This article details a multi‑stage server compromise that injected gambling pages, planted hidden accounts, deployed crypto‑mining software, and opened unnecessary ports, providing step‑by‑step forensic analysis, code inspection, emergency response actions, and indicators of compromise.

crypto miningincident responseinformation security
0 likes · 12 min read
How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough