• Quibblekrust@thelemmy.club
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 hours ago

      First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.

      It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.

    • StrawberryPigtails@discuss.tchncs.de
      link
      fedilink
      arrow-up
      2
      ·
      14 hours ago

      I fell it’s going to be a bad couple of months for everybody, not just Linux. It’s just with open source, it’s easier for the LLMs to find things that have been missed. And more open when they do because you can see the bug reports.

    • reluctant_squidd@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      14 hours ago

      I think it’s best to read the actual docs published by the research when available. News tells some, but I have seen it sensationalized a few times, where it only affects x kernel with y module before update z.

      That being said, these are seemingly getting more and more frequent as previously noted.

  • mecen@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    12 hours ago

    If it was backdoor that means someone created it maliciously or it is bug?

    • Gagootron@feddit.org
      link
      fedilink
      arrow-up
      1
      ·
      11 hours ago

      It is a tool to establish persistente after the server is already hacked. This isn’t a way to break into a server.