Shutterstock / VL-PhotoPro
News + Trends

How to identify 16,000 attacked servers in the network

Spektrum der Wissenschaft
10.9.2025
Translation: machine translated

Researchers have taken compromised servers out of circulation on a large scale. To do this, they utilised the peculiarities of a widespread internet protocol and beat the attackers at their own game.

The researchers used this mechanism to identify compromised systems. They sent a total of 52 such public keys, which are known from previous attacks by groups such as «teamtnt», «mozi» or «fritzfrog», to all SSH servers connected to the internet. If one of these servers responds with a challenge to one of the keys, it is clear that attackers have installed their own key on the system - the server has been compromised.

In total, the scans uncovered more than 16,000 compromised servers at hosting suppliers, companies and research institutions, many of which were linked to known malware infrastructure. After affected network operators were informed about the infection, the number of compromised hosts dropped significantly, as follow-up investigations showed.

Spectrum of Science

We are a partner of Spektrum der Wissenschaft and want to make well-founded information more accessible to you. Follow Spektrum der Wissenschaft if you like the articles.

Original article on Spektrum.de

Header image: Shutterstock / VL-PhotoPro

32 people like this article


User Avatar
User Avatar

Experts from science and research report on the latest findings in their fields – competent, authentic and comprehensible.


Security
Follow topics and stay updated on your areas of interest

News + Trends

From the latest iPhone to the return of 80s fashion. The editorial team will help you make sense of it all.

Show all