Black Hat/White Hat

This is a first, as far as I can tell.

Instead, the author or authors of the malware appear to be using it to actually secure infected devices. Symanetc [sic] believes the malware has infected tens of thousands of routers and other IoT systems around the world. Yet, in the two months that the security vendor has been tracking Linux.Wifatch it has not seen the malware tool being used maliciously even once.

10 Replies to “Black Hat/White Hat”

  1. “… it has not seen the malware tool being used maliciously even once.”
    Oh, but you will!
    Why dig a tunnel if you never plan to use it.
    Tick tock, tick tock…

  2. This is a first, as far as I can tell.

    Morris worm, at least, predates it by.. a fair bit. Could be earlier others too…

  3. No one has mentioned it;
    so I will..
    Anyone using Linux knows that if a hacker tries to hack a Linux user,
    He will probably get the shaft in his own backdoor.
    The Hacker will become the Hackee..

Navigation