While it's an impressive piece of scripting, to infect a system, a person still has to download and run this.
Then said person has to type in passwords for root and other systems accessed by SSH. On top of that the person originally running the virus needs to be careless, as the exploits in use are several years old.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.