well fun morning, server from friends got epic haxored so i did forensics from my phone, in bed

- ssh with password auth enabled
- ssh'd into minecraft user with apparently weak password
- deployed payload, consisting of an irc c&c, and a monero miner disguised as 'kswapd0'

by far not the only ones, for example blog.alvarezp.org/2020/06/18/m

Follow

the kswapd0 thing is pretty smart, as all the results for 'kswapd0 high cpu' (which you would be seeing) are non-malicious explanations like
askubuntu.com/questions/259739

same with .syslog I've seen it like that on someone else's machine hah

Sign in to participate in the conversation
Pixietown

Small server part of the pixie.town infrastructure. Registration is closed.