Security researchers are warning administrators to secure their servers in the wake of new Secure Shell (SSH) attacks.
Researchers at security firm SANS warned that so-called "brute force" attacks were occurring on a daily basis. The attacks attempt to guess usernames and passwords in order to compromise the server.
To help guard against the attacks, SANS researcher Daniel Wesemann recommended that administrators try to make both usernames and passwords more difficult for attackers to guess.
"If you are running any SSH server open to the internet, and your usernames and passwords aren't at least eight characters or so, your box is either owned by now, or about to be," explained Wesemann.
"It doesn't matter one bit what sort of device it is - those who run these scans have proven to be equally apt at taking over a Cisco router as they are at subverting an iMac."
In addition to complicating usernames and passwords, Wesemann also suggested that administrators use other simple measures such as moving SSH off of port 22 and monitor logs for suspicious activity. While the measures will not prevent an attack, Wesemann said that they would at least make compromising a machine more difficult.
"Yes we know that picking complicated usernames and moving SSH off port 22 are 'security by obscurity' and not real security," Wesemann admitted. "But fact is that they both help to thwart the rampant brute force attacks. Bulletproof is nice, but if it can't be had, good camouflage sure beats being a plum target!"
Geoengineering on the sea floor near glaciers would form a new ice shelf to prevent melting
Alterations in capillary blood flow can be caused by body position change
Curiosity rover is in 'normal mode' but not transmitting scientific data back to base
NatWest outage comes a day after Barclays' IT systems shut out customers and staff