The gaming sector is the primary target, followed by educational institutions.

Akamai SIRT released a threat advisory this morning authored by Security Response Engineer Tsvetelin Vincent Choranov.

The XOR.DDoS rely on Linux machines that were compromised by cracking weak passwords used to protect the command shell.

Linux Malware XOR.DDoS uses your Linux PCs to mount DDoS attacks

To check whether your Linux machine is infected by XOR.DDoS malware, usenetstatto print any current web connection/internet connections.

Usetcpdumpto get a more detailed analysis of which packets you are sending out to identify unknown packets.

You may use any command based ontopor onpsto check for running malicious processes.

spot_img

Malware removal

it’s possible for you to use this pointers to remove the XOR.DDoS.

/boot//etc/init.d//etc/rc.d/etc/rcX.d/usr/bin//lib//lib/udev/udev/lib/udev/debug

ReferBlazes security blogfor complete analysis of XOR.DDoS.

source: www.techworm.net