Settings

Theme

Hackers hijack Linux devices using PRoot isolated filesystems

bleepingcomputer.com

3 points by anomalytics 3 years ago · 1 comment

Reader

theamk 3 years ago

This title is pure clickbait.

Hackers _which already hijacked Linux devices_ via some other means, use PRoot to run the code. That "makes these post-exploitation attacks platform and distribution-agnostic".

There is nothing in PRoot particularly useful for attacks -- making Linux software platform and distribution-agnostic is what basically every Linux developer out there wants, and there is a number of projects for this, including docker, appimage, flatpak and others.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection