Event JSON
{
"id": "b3ed9d01513673eee489d8928e04ceed7a892da8dd7d83c34c99c220c4b58605",
"pubkey": "a3af17104f91f7f9b5667b14717d1d434931195e4c6e075b7dc13d8ed71bc46f",
"created_at": 1715792316,
"kind": 1,
"tags": [
[
"imeta",
"url https://files.mastodon.social/media_attachments/files/112/446/165/174/573/590/original/3fbfa66bd347cc00.jpeg",
"m image/jpeg"
],
[
"proxy",
"https://mastodon.social/@arstechnica/112446165231610945",
"web"
],
[
"proxy",
"https://mastodon.social/users/arstechnica/statuses/112446165231610945",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://mastodon.social/users/arstechnica/statuses/112446165231610945",
"pink.momostr"
]
],
"content": "SSH backdoor has infected 400,000 Linux servers over 15 years and keeps on spreading\n\nEbury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.\n\nhttps://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/?utm_brand=arstechnica\u0026utm_social-type=owned\u0026utm_source=mastodon\u0026utm_medium=social\nhttps://files.mastodon.social/media_attachments/files/112/446/165/174/573/590/original/3fbfa66bd347cc00.jpeg\n",
"sig": "5a49bfc5d78c3a7cbdfad76eda6b4771ba1d197b23ed0b570288115eb3cb4e49649b22f96137d20cacd4b4283f896b0d92cb7759ade528722e9207e9a499c3fa"
}