Beware! 150+ SSH Accounts With Root Access Advertised On Hacker Forums

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

Post Sharing

In a concerning development for cybersecurity, over 150 SSH accounts with root access are currently being advertised for sale on various hacker forums.

These accounts reportedly provide unrestricted administrative access to Virtual Private Servers (VPS), posing a significant threat to the security of the affected systems.

The seller has listed each account with detailed information, including usernames, passwords, IP addresses, and ports, making it easier for potential buyers to exploit these credentials.

On-Demand Webinar to Secure the Top 3 SME Attack Vectors: Watch for Free.

The asking price for these compromised accounts is $300 each, which could attract a wide range of cybercriminals looking for easy access to potentially valuable corporate or personal data.

Root access on a server means that the user has the highest level of control and can perform any actions on the system, including installing software, accessing all files, changing configurations, and even deleting data.

This level of access can be devastating if used maliciously, as it can lead to data theft, installation of malware, and potentially severe disruptions in operations.

The advertisement of such accounts is particularly alarming because it indicates a breach of security protocols somewhere along the line, likely involving poor password management or vulnerabilities in software that hackers have exploited.

It also underscores the importance of robust security measures, including the use of strong, unique passwords, regular software updates, and the implementation of multi-factor authentication.

Cybersecurity experts advise administrators of Virtual Dedicated Servers to audit their systems for any signs of unauthorized access and to change passwords immediately if they suspect their systems might be compromised.

Additionally, to enhance security, it is recommended that SSH keys be regularly updated and that public key authentication be used where possible.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide