FireEye said the Linux rootkit malware, dubbed XOR.DDoS, uses multiple persistence mechanisms including a rare Linux rootkit to attack victims.
Potentially, the attacks can hit desktop machines and mobile or embedded devices.
If a login attempt is successful, the brute forcing machine immediately logs out and stops its attack. On the other hand, the attack delivers customized malware that may be compiled on-demand, making signature-based detection systems ineffective.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now