Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

SANS reporting ssh brute force attacks

HangingChad (677530) writes | more than 6 years ago

Security 1

HangingChad writes "Yesterday SANS highlighted 4 separate reports of an increase in ssh bruteforce attacks. From the article: "The isc.sans.org port 22 graph supports this as there has been a large increase in the source hosts seen in ssh scans during this month." There is speculation that this is part of a distributed, coordinated attack. I'm getting hearsay reports from some of my admin buddies that they're seeing ssh dictionary attacks today. Anyone else experiencing unusual ssh traffic the last couple days?"
Link to Original Source

cancel ×

1 comment

Sorry! There are no comments related to the filter you selected.

A large increase (0)

Anonymous Coward | more than 6 years ago | (#21092967)

Starting just after midnight UTC last saturday morning, I noticed a large increase in ssh attempts. Mostly dictionary attacks against root, mysql and admin, plus the normal collection of scripted username exploits.

In the past four days I've blocked 126 hosts, compared to only 14 blocked in the entire two weeks prior to last saturday.
Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>