the NoaBot targets weak passwords connecting SSH connections.
Harden your configs people.
AllowUsers is a really goood one.
This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.
Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.
Rules:
1: All Lemmy rules apply
2: Do not post low effort posts
3: NEVER post naziped*gore stuff
4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.
5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)
6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist
7: crypto related posts, unless essential, are disallowed
the NoaBot targets weak passwords connecting SSH connections.
Harden your configs people.
AllowUsers is a really goood one.
Or just don't allow password auth at all.
Or just have a good password
If we're going to play that game. Require an Ed25519 key with a strong password.
Or ed25519-sk.
(In this case the "wrench" is just breaking into some weak link that isn't ssh, once your password is strong to not be a weak link)
Akamai has published an extensive library of indicators that people can use to check for signs of NoaBot on their devices (https://github.com/akamai/akamai-security-research/tree/main)
GCs those Akamai folks...
What does GC stand for? https://www.acronymfinder.com/Slang/GC.html
Good cunts - it's originally an Aussie term of endearment, as far as I'm aware
Garbage Collection
In this context i'm going with Game Chick from that list, because none make sense to me.
here's a link to the script. its nothing fancy, but makes it easy to check: https://github.com/akamai/akamai-security-research/blob/main/malware/noabot/noabot_detect.sh
Very poor title, like someone's just got their "Big Book of Clickbait"
Everything is under attack all the time, and everything is never-before-seen until it's seen.
I love how in security, we have gone from "use strong passwords" to "don't make your own passwords", because people will just refuse to learn.