Featured Slideshow
For Sale: Cheap access to corporate computers
Thursday, November 15, 2012
Posted by l33tdawg
Security
0 comment(s)
Cybercriminals are openly selling illegal access to the computer networks of many of the world's biggest companies.For only a few pounds or dollars, fraudsters and scammers can get the login in... read more
Obama signs security cyber-operations guidelines
Thursday, November 15, 2012
Posted by l33tdawg
GOV, Industry News, Security, US
0 comment(s)
President Barack Obama has signed a classified directive laying out new guidelines for cyber-operations that national security planners can use to protect U.S. computer networks from attack, a senior... read more
Malware identified as latest OS X trojan targeting Tibetan activists
Thursday, November 15, 2012
Posted by l33tdawg
Apple, Tibet, Viruses & Malware
0 comment(s)
A new variant of Mac malware Imuler has been identified targeting Tibetan activists. The discovery was made by Bellevue, Wash.-based Apple platform security vendor Intego Inc.According to a blog post... read more
Dropbox hits 100 million users
Thursday, November 15, 2012
Posted by l33tdawg
Dropbox, Industry News
0 comment(s)
Dropbox has announced that it has reached 100 million users, an impressive number to be sure. For comparison's sake, here's Wikipedia's list of virtual communities with more than 100 million... read more
Cray vs. China: The race to 100 Petaflops
Thursday, November 15, 2012
Posted by l33tdawg
China, Cray, Hardware, Industry News, Technology
0 comment(s)
Hot on the heels of the 20 Petaflops Titan supercomputer at Oak Ridge National Laboratory, the recently crowned worldโs fastest supercomputer, Cray has announced the XC30 architecture, which will... read more
You are here
Home › Linux worm turns on Mambo and PHP
Linux worm turns on Mambo and PHP
Submitted by hitbsecnews on Mon, 2006-02-20 23:50
Tweet
Security experts today warned of a Linux network worm that exploits holes in the Mambo content management system and the PHP XML-RPC library.
Dubbed Mare.D, the worm leaves multiple backdoors on infected systems. Two of these are connectback shell backdoors that link to a remote host, while a third allows the malware's writer to access and control infected systems via IRC.
"The main component of the Mare.D worm is written in C and compiled with the GNU C compiler," said F-Secure researcher Gergely Erdelyi. The worm scans for vulnerable systems automatically and installs a small shell script which downloads the rest of the malware.
- Log in or register to post comments
- 5078 reads
You May Also Like
Malware identified as latest OS X trojan targeting Tibetan activists
Thu, 2012-11-15 00:51
E-mailed malware disguised as group coupon offers on the rise
Wed, 2012-11-14 04:58
Android adware capability a vulnerability, claim boffins
Thu, 2012-11-08 00:42