Re: Linux Australia breached, personal details leaked

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Tue, 2015-04-07 at 12:28 -0400, m.roth@xxxxxxxxx wrote:

> “It is the assessment of Linux Australia that the individual utilized a
> currently unknown vulnerability to trigger a remote buffer overflow and
> gain root level access to the server,” Hesketh wrote.
> 
> The attacker installed a remote access tool and then botnet command and
> control software.
> --- end excerpt ---
> 
> <http://www.cio.com/article/2906814/linux-australia-breached-personal-details-leaked.html>

Its stupid and unprofessional to store personal data on a public
accessible server when there is no current public requirement for that
data.

How do these people ever become 'konputar xperts' ?

I would like to know what operating system was used and the method used
to gain access.


-- 
Regards,

Paul.
England, EU.      Je suis Charlie.


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos





[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux