Unix botnet Operation Windigo steals your credentials and sends tons of spam

botnet

A security research team has discovered a long-standing Unix botnet which has generated a massive amount of malware in recent years. Dubbed “Operation Windigo,” the botnet was discovered and reported by antivirus software-maker ESET, working with an international task force consisting of the German Computer Emergency Response Team, or CERT-BUND, and the Swedish National Infrastructure for Computing, among others. As malware goes, Windigo operates a bit like a Swiss Army knife, doing everything from redirecting traffic to compromised sites, to sending millions of spam emails every day for at least two and a half years.

According to ESERT, Windigo allegedly hijacked 25,000 UNIX servers using a Trojan, stealing credentials and data from its targets. ESET Security Researcher Marc-Étienne Léveillé says that Windigo attacks more than 500,000 targets per day.

WINDIGO_SM_Picture

To make matters worse, Windigo takes different forms depending on what OS you’re using. When Windigo attacks Windows PCs, they attempt to swipe the target’s data using an exploit kit, while Mac users get hit with popups for dating sites.

How to Check if Your Server is Infected by the Operation Windigo Botnet

There’s a way to fight back though. ESET says that Unix system admins can identify whether or not a their server is infected by Windigo by using the command below.

$ ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo “System clean” || echo “System infected”

If the system is infected, ESET recommends you wipe the machine, re-install the OS, and change all of the passwords used with that system.

“We realise that wiping your server and starting again from scratch is tough medicine,” says Léveillé, “but if hackers have stolen or cracked your administrator credentials and had remote access to your servers, you cannot take any risks.”

Mobile

These parental control apps will help keep your kids' device habits in check

Looking for extra security and monitoring on mobile devices? Take a look at the best parental control apps for limiting time and keeping watch on your child's phone usage and behavior. We have the top options for Android and iOS here.
Outdoors

Snooze soundly anywhere you lay your head with the best sleeping bags

A proper sleeping bag has the ability to make or break a camping or backpacking trip. Here are our picks for the best sleeping bags on the market to help you choose the correct bag for any type of outdoor adventure.
Emerging Tech

Are e-cigarettes safe? Here’s what the most recent science says

Ecigarettes are widely regarded and advertised as a healthier alternative to cigarettes for people who are trying to kick the smoking habit. How safe are these cigarette alternatives? We went deep into the recent scientific literature to…
Mobile

5G’s arrival is transforming tech. Here’s everything you need to know to keep up

It has been years in the making, but 5G is finally becoming a reality. While 5G coverage is still extremely limited, expect to see it expand in 2019. Not sure what 5G even is? Here's everything you need to know.
Computing

Secure your Excel documents with a password by following these quick steps

Excel documents are used by people and businesses all over the world. Given how often they contain sensitive information, it makes sense to keep them from the wrong eyes. Thankfully, it's easy to secure them with a password.
Computing

Which Macs are compatible with MacOS Mojave?

Is your computer ready for Apple's big Mojave update? Here's what you need to know about MacOS Mojave compatibility, what Macs can successful download Mojave, and the requirements you need to know about.
Emerging Tech

Awesome Tech You Can’t Buy Yet: Booze-filled ski poles and crypto piggy banks

Check out our roundup of the best new crowdfunding projects and product announcements that hit the web this week. You may not be able to buy this stuff yet, but it sure is fun to gawk!
Computing

Change your mouse cursor in Windows with these quick tips

The standard mouse cursor is boring, so change it! With this guide on how to change your mouse cursor in Windows, you can choose to use one of Microsoft's pre-installed cursors or download something a bit more extravagant.
Gaming

The DualShock 4 is one of the best controllers ever, and you can use it with a PC

Sony's new DualShock 4 controller has become a fan favorite, and some people want to use it with a PC. Here's how to connect your DualShock 4 and start using it, either with an official adapter, or unofficial software.
Computing

MacBook Pro battery replacement: Everything you need to know

Looking for a new battery for your MacBook Pro? It's important you know what to look for, what model you have, and what options Apple gives you! We'll cover everything you need to know about Apple MacBook Pro battery replacement.
Computing

Lost your router? Here's how to find its IP address to help track it down

Changing the login information for your router isn't always easy, that's why so many have that little card on the back. But in order to use it, you need to know where to go. Here's how to find the IP address of your router.
Computing

Acer Swift 7 vs. Apple MacBook Air

The Acer Swift 7 accomplishes its goal of being the world's thinnest notebook, and it's well-built to boot. But is that enough to take on the Apple MacBook Air in terms of being the better to actually use?
Computing

Asus ZenBook 14 UX433 vs. Dell XPS 13

The Asus ZenBook 14 UX433 has some incredibly tiny display bezels, in an effort to jam a 14-inch notebook into a 13-inch chassis. That pits it against the Dell XPS 13, the icon of small clamshells.
Computing

Intel’s 28-core monster Xeon CPU might cost upwards of $4,000

Intel's new-generation 28-core Xeon CPU will debut with a hefty price tag. Although not quite as expensive as some of its predecessors, early pre-order pricing has it costing between $4,000 and $5,000.