Dormant Malware, the Hidden Threat Lurking in Your Systems

In cybersecurity, malware remains a persistent and growing concern. One of the most dangerous forms of malware is dormant malware, also known as sleeper malware.

This malicious software can remain inactive for extended periods within a system before being activated by cybercriminals, sometimes waiting for months or even years. While there is no precise data on how many systems are infected with dormant malware, certain statistics shed light on the prevalence and potential impact of this hidden threat.

Dormant Malware Prevalence

The term dormant malware refers to malicious programs that are intentionally left inactive, sometimes for months or even years, before being triggered by external, but mainly by internal, conditions – keywords, access to specific files, date events… This form of malware is challenging to detect because it does not show any obvious signs of compromise until activated. Some key data points provide insight into how dormant malware may be affecting systems worldwide:

  • 560,000 new malware samples are detected DAILY, contributing to an already staggering total of over 1 billion known malware programs. Many of these could potentially remain dormant within infected systems, waiting for the right conditions to activate [1], with the staggering cost of an average of US$/EUR 4.5 million per incident.
  • In 2023, the total number of malware attacks worldwide reached an alarming 6+ billion, marking a 10% increase from the previous year [2]. This increase in attacks raises concerns about the growing threat landscape, with dormant malware being a likely factor in many incidents.
  • A particularly concerning statistic is that nearly every second computer in China is infected with malware, with a 47% infection rate that ranks as the highest globally. Many of these infections could involve dormant malware that is lying in wait for activation [1], and it can spill over into systems worldwide, including the West.

Malware knows no borders, much like influenza.

Factors Contributing to Dormant Malware

There are several reasons why malware might remain dormant in a system. Understanding these threats can help organizations strengthen their defenses and detect them more effectively:

  1. Dependency on External Infrastructure: Dormant malware may not activate if it cannot communicate with its command-and-control (C&C) server, which is responsible for sending activation commands. Without this connection, the malware remains inert until the link is re-established [3]. This is my favorite method, ‘air-gapped systems’, but still not safe without certain precautions.
  2. Internal Component Dependency: Many malware families consist of multiple components that must work together to execute their payload. If a critical component is missing, the malware may remain dormant until the necessary components are present or accessible [3], making it undetectable.
  3. Missing/Expected Input: Some malware requires specific inputs or conditions to execute, as mentioned before. Without these triggers, such as certain user actions or system events, the malware stays inactive, posing a potential threat that could go undetected until activation [3].
  4. Broken ‘Packer‘: Malware often uses packers (encryption tools) to evade antivirus detection. If the packer malfunctions or breaks, the malware may fail to unpack and remain dormant, as the broken payload can be replaced or reinitialized when a suitable trigger activates it. [3].

Impact and Detection Challenges

The threat posed by dormant malware is varied. On one hand, its ability to stay hidden for extended periods makes it difficult to detect. On the other hand, when activated, it can cause huge ravages, not only in terms of financial loss but also in exposing individuals’ private lives to the world. Major challenges include:

  • Extended Dwell Times: Cybercriminals often rely on extended dwell times, using these inactive periods to plan their attacks carefully and maximize the damage once the malware is activated. The longer the malware stays dormant, the more time attackers have to refine their strategies [6].
  • Traditional Security Gaps: Traditional perimeter security tools, such as firewalls and antivirus software, may fail to detect dormant malware, allowing it to sit undetected for weeks, months, or even longer. As cybersecurity tools become more sophisticated, so do the methods that malware uses to remain hidden [6].
  • Case Studies of Detection: In Q3 2023, Kaspersky’s security solutions blocked banking malware on the computers of 76,551 unique users. While it’s unclear whether these infections were dormant before activation, this statistic highlights the scope of the problem and the challenges in detecting malware that lies in wait [4].

Why You Should Care About Dormant Malware

Dormant malware is particularly dangerous because systems may appear to be functioning normally while harboring malicious code that can be triggered at any time. Organizations and individuals alike must understand the threat and take proactive measures to protect their data and systems.

How to Defend Against Dormant Malware

To mitigate the risks, it’s critical to implement comprehensive cybersecurity strategies that go beyond traditional defenses:

  • Advanced Detection Tools: Rely on more sophisticated security software that can detect and analyze suspicious activities over extended periods, looking beyond the immediate threat to uncover hidden dangers.
  • Regular Security Audits: Conduct regular security audits to identify any signs of dormant malware and ensure that all components of your system are functioning properly.
  • Employee Training: Educate employees on the risks of malware, including dormant threats. Awareness and vigilance can go a long way in preventing the initial infection that could lead to dormant malware. As I’ve written multiple times, don’t click on any suspicious links – the most prevalent cyberthreat ever, PHISHING.
  • Network Segmentation: Segment networks to limit the spread of dormant malware. If malware does become active, limiting its ability to move through the system can contain the damage. Segment the data from the system !!!

While precise statistics on dormant malware infections are elusive, the data available paints a clear picture:

Dormant malware is a growing concern among all companies.

With increasing numbers of malware attacks and the sophistication of these threats, organizations must remain vigilant and employ advanced detection techniques to identify and mitigate dormant malware risks, without forgetting to train your employees. By focusing on both technological solutions and user education, we can reduce the chances of becoming the next victim of this hidden threat.


References:

[1] Astra Security, Malware Statistics – https://www.getastra.com/blog/security-audit/malware-statistics/
[2] Statista, Malware Attacks Per Year Worldwide – https://www.statista.com/statistics/873097/malware-attacks-per-year-worldwide/
[3] Tripwire, Four Common Scenarios for Dormant Functionality in Malware – https://www.tripwire.com/state-of-security/four-common-scenarios-for-dormant-functionality-in-malware
[4] Securelist, IT Threat Evolution Q3 2023 – https://securelist.com/it-threat-evolution-q3-2023-non-mobile-statistics/111228/
[5] Statista, Malware Overview – https://www.statista.com/topics/8338/malware/
[6] Node4, Why Ransomware Hides in Your Systems for Months – https://node4.co.uk/blog/why-ransomware-now-hides-in-your-systems-for-months/
[7] Gabsten, Dormant Malware: Beware the Lurking Threat to Your Data – https://www.gabsten.co.za/2024/01/19/dormant-malware-beware-the-lurking-threat-to-your-data/

Security Made Simple – Part 4

Your Handbook for Everyday Security


This series of articles is based on a handbook used as an outline for cybersecurity courses, viewed from a user perspective. The handbook, or these articles, is copyrighted by Vasco F. Gonçalves, working for SDNC sàrl.


Rise of WireGuard Personal VPN in Routers

Router-Level WireGuard VPN

  1. Enhanced Privacy Integration: Some router manufacturers have begun integrating WireGuard, a high-performance VPN protocol, directly into their firmware.
    • Example: Companies like ASUS, Netgear, or others have started including WireGuard support in their router firmware, allowing users to establish a personal VPN directly from their router.
  2. Simplified Privacy Protection: WireGuard in routers enables users to encrypt and protect all internet traffic from connected devices without needing individual installations or configurations.
    • Example: Users can secure their entire home network with VPN encryption, safeguarding every device connected to the router.

Benefits of Router-Integrated VPNs

  • Ease of Use: Users can establish a VPN connection for their entire network with a few clicks, simplifying the process for those less familiar with VPN setup.
  • Comprehensive Security: Encrypting internet traffic at the router level ensures privacy and security for all devices connected to the network.

Considerations and Adoption

  • Compatibility Check: Ensure your router supports WireGuard or any other VPN protocols you prefer before relying on this feature.
  • Configuration and Setup: Despite being integrated, understanding router-specific settings for VPN configuration might still be necessary.

Seamless Setup with WireGuard Smartphone App and FritzBox Integration

WireGuard Smartphone App Integration

  1. QR Code Import: The WireGuard smartphone app allows users to generate a QR code containing configuration details for their VPN setup.
    • Example: Users can create a QR code within the WireGuard app on their smartphone that holds all the necessary configuration data for a VPN connection.
  2. FritzBox Compatibility: When setting up a WireGuard VPN on a FritzBox router, users can use the smartphone app’s QR code to import the configuration seamlessly.
    • Example: Scanning the QR code from the WireGuard app with the FritzBox interface automates the setup process, importing all necessary settings for the VPN connection.

Advantages of QR Code Integration

  • Effortless Configuration: QR code integration simplifies the transfer of setup data from the smartphone app to the FritzBox router, reducing manual input errors.
  • User-Friendly Experience: Users can enjoy a streamlined setup process without the need for extensive technical knowledge or manual configuration.

Utilizing QR Codes for Setup

  • Generate QR Code: Within the WireGuard smartphone app, users can generate a QR code containing the configuration details for their VPN connection.
  • Scan QR Code on Router: Using the FritzBox interface, users can scan the generated QR code from their smartphone, importing the settings for the WireGuard VPN.

Next – we will speak about:

Mobile Security Essentials

Unveiling the Mystery of Cryptocurrency Heists

Understanding Risks and Safety Measures

In the fast-paced world of digital currencies, there’s an alarming trend making headlines – cryptocurrency heists, or robbery. These cybercrimes, often orchestrated by skilled hackers, have governments and investors on edge. Let’s break down:

  • What’s happening?
  • What’s at risk?
  • How to stay safe in this crypto world?

What’s Worrying Governments?
Governments, especially in Western countries, are sweating over the potential for huge crypto heists funding shady activities and the bankruptcy of individuals and companies. Imagine nuclear weapons programs or money laundering schemes, all funded by stolen cryptocurrencies.

That’s not all, some governments are waiting for the heist of the century – behind doors, many mention up to half a trillion dollars. It’s not a tale. Recently, hackers linked to the supposed North Korean government pulled off a jaw-dropping $100 million heist from a California-based company, even more recently HTX with its Heco Chain had a heist of $115 million (see TikTok and Instagram for more information*). That money was quickly laundered, leaving authorities scrambling.

As this article says: “[Many] discovered the hard way that trading cryptocurrencies such as bitcoin happens in an online Wild West where sheriffs are largely absent.” [1].

The Troubling Trends.

Cryptocurrency heists are on the rise, and quite fast. Think of 2022 as the “Year of Crypto Hacking,” with a staggering $3.8 billion swiped from crypto businesses [2]. And here’s a shocker: most attacks, a whopping 82.1%, targeted decentralized finance (DeFi) platforms [2]. Those North Korean hackers? They’ve made off with over $2 billion in various attacks over the past few years [3].

Who’s in the Center of attention?

Picture this: hackers setting their sights on cryptocurrency exchanges and DeFi platforms. These are like treasure troves for cyber bandits. They’re using sneaky tactics like tricking people (that’s called social engineering – see these TikTok and Instagram accounts*) or finding weaknesses in software, especially software wallets, to get into these systems [4].

What Happens Next?

When these heists occur, it’s chaos for individuals and companies. Sometimes, the thieves vanish with the loot because tracing cryptocurrencies is nearly impossible. Other times, law enforcement manages to reclaim some funds [5]. The FBI’s been busy chasing after North Korea’s Lazarus Group, which has snatched hundreds of millions of dollars in crypto [6].

Keeping Safe in the Crypto Jungle

Now, how do you protect yourself from these sneaky thieves? Strong security measures are key. Imagine having a lock with two keys instead of one – that’s two-factor authentication. It’s like having an extra security guard for your digital wallet. Staying informed about the latest tricks hackers use is also crucial.

Big Fish and Small Fish

Whether you’re a big investor (called crypto whales) or a small one, these heists can seriously sting, in average almost $100,000.[7] But there are ways to safeguard your assets. Crypto whales often use what’s known as multi-key wallets, a super-secure way to store their digital money [8] – generally more complicated, as slower speed in transactions, need a certain technical know-how, and it takes longer to recover your funds [8A]. For everyone else, using secure hardware wallets, along with extra authentication steps, can help keep those digital coins safe.

The Ledger Lockdown

Speaking of secure wallets, let’s talk about Ledger wallets. These are like ultra-safe piggy banks for your digital cash. They use a fancy thing called a Master Seed, which generates lots of keys. Although it’s not exactly the usual multi-key system, it’s close enough to make it super secure [9]. My colleague tested some hardware wallets. Most of them were extremely secure, but Ledger came out in first place.

Here’s my recommendation for a hardware wallet. The reason for it is its multi-versatility among our computers and smartphones (works securely on the major platforms, Windows, MacOS, iOS and Linux systems):

https://shop.ledger.com/pages/ledger-nano-x/?r=56eeff14bf75

It exists in different colors.

ONLY DOWNLOAD Ledger Live from verified and official sources. For the smartphones through their respective stores, Apple and Android or from https://www.ledger.com/ledger-live for computers. NOWHERE else !!! It prevents phishing attempts or malware infections.

In Conclusion

Cryptocurrency heists are like modern-day bank robberies, only way sneakier. But understanding the risks and taking steps to protect yourself can make a world of difference in this fast-evolving crypto world.

Disclaimer:

I have an affiliation with Ledger due to their top-notch security features.

References

[1] https://www.reuters.com/investigates/special-report/bitcoin-exchanges-risks/

[2] https://www.chainalysis.com/blog/2022-biggest-year-ever-for-crypto-hacking/

[3] https://www.trmlabs.com/post/inside-north-koreas-crypto-heists

[4] https://blog.cryptostars.is/how-cryptocurrency-exchanges-get-hacked-369633976322

[5] https://edition.cnn.com/2021/12/12/tech/crypto-exchange-hacks-explainer/index.html

[6] https://www.darkreading.com/threat-intelligence/fbi-warns-of-cryptocurrency-heists-by-north-koreas-lazarus-group

[7] https://usa.kaspersky.com/about/press-releases/2023_kaspersky-survey-finds-one-in-three-users-have-experienced-crypto-theft-average-loss-is-97583

[8] https://linen.app/articles/store-crypto-as-whales-do-the-definitive-guide

[8A] https://blockworks.co/news/what-are-multisig-wallets

[9] https://www.ledger.com/ledger-live

* TikTok: https://www.tiktok.com/@dark_web_legal/ (last videos – as of Nov 2023)

Instagram: https://www.instagram.com/encryptyourworld/ (last slides – as of Nov 2023)

HTX and Heco Chain: https://www.coindesk.com/tech/2023/11/22/justin-sun-confirms-htx-heco-chain-exploited-after-100m-in-suspicious-transfers/

For inquiries, please contact:

info [at] digitaltran [dot] eu

Ignoring our online privacy, is it life threatening?

Do you know who has access …

  • … to your Digital ID?
  • … to your Digital Health?
  • … to your Digital Shopping?
  • … to your Travel Restrictions?
  • … to your Central Bank Digital Currency?

Chances are, the answer is
‘Don’t know!’

But there is something that can be done to secure your online privacy in our digital age.

In our increasingly connected digital world, protecting personal information has become a matter of utmost importance. Neglecting online privacy can have severe consequences, including identity theft, financial fraud, and cybercrime. In a world where technology and the internet play a central role in our daily lives, it is imperative that we take steps to secure our digital footprint and protect our personal information from exploitation by governments, corporations, and cybercriminals.

The collection and use of personal information by governments and corporations is a significant threat to online privacy. Governments can gather data through various sources, such as databases, surveillance programs, and data retention laws. This information can range from basic personal details to online behavior, purchasing habits, social media contributions, and even health records. The use of this information for national security or to monitor citizens’ activities often happens without their consent or knowledge.

Corporations collect personal information through tracking technologies, such as cookies and browser fingerprinting, and data-sharing agreements. This information is used for marketing and advertising purposes, such as targeted advertisements and personalization, without individuals’ consent or knowledge, leaving them vulnerable to exploitation and privacy violations.

The collection and use of personal information can compromise an individual’s online and physical security. As former NSA and CIA Director Michael Hayden famously said:

“We kill people based on metadata.” *

* What is metadata?
Metadata describes other data, often secret data, for instance, telephone numbers, to whom you spoke, how long you spoke, which country you called …

This highlights the importance of understanding the dangers of metadata and the need to protect our personal information.

We all experienced this nightmare since years, but more so from 2020 until today, and it still continues in certain countries! We just opened the Pandora box!

Open-source software is a type of software that can be freely accessed and modified by anyone. This makes it more secure and transparent compared to proprietary software. In the context of online privacy, open-source software can offer secure and anonymous ways to access the internet by encrypting the user’s data and hiding their IP address (a unique numerical label assigned to every device connected to the internet, used to identify and communicate with it). This helps to protect the user’s online privacy and personal information from being collected and used by governments and corporations. These last two identities use this type of software to protect themselves.

In addition to the use of secure e-mail providers and encrypted browsers, there are several other steps that individuals can take to protect their online privacy:

  • Use strong and unique passwords: Strong passwords are essential for protecting your online accounts from cyberattacks. Use a combination of letters, numbers, and symbols, and make sure that each password is unique to each of your accounts.
online passwords — pixabay.com
  • Enable two-factor authentication: Two-factor authentication is a security measure that requires a second factor, typically a code sent to / given by your phone, in addition to a password to access an online account, providing an extra layer of protection against unauthorized access.
  • Be cautious with personal information: Be careful about the personal information that you share online and documents that you throw away in the garbage or dust bin. Think twice before posting sensitive information, such as your home address or financial information, on social media.
social media — pixabay.com
  • Use a virtual private network (VPN): A VPN encrypts your internet traffic and protects your online activities from prying eyes. A local VPN can save you a lot of money too.
  • Keep software and systems up-to-date: Software updates often contain security patches that protect against new threats, so make sure that your software and systems are always up-to-date (Windows, Linux, MacOS, Android, iOS, …).
  • Be aware of phishing scams: Phishing scams are a common way for cyber-criminals to steal personal information. Be cautious of e-mails, SMS or messages that ask for sensitive information, such as passwords or credit card numbers, and always verify the source before providing any information. Even in the dating world (see my previous article).
  • Review privacy settings: Regularly review the privacy settings of your social media accounts and other online services to ensure that you are comfortable with the information that is being shared – they changed these settings often without telling anything.

In conclusion, protecting our online privacy has become increasingly important in our digital age, more so after 2020. The collection and use of personal information by governments and corporations, as well as the rise of cyberthreats, have made it imperative for individuals to take steps to protect their personal information and online security. From using strong passwords and two-factor authentication to utilizing privacy-focused software and VPNs, there are several measures we can take to safeguard our online privacy. It’s important to note that the risks to our personal information and security are real and ongoing, and that we must remain vigilant in our efforts to protect it. By being mindful of the threats and taking proactive steps to secure our online presence, we can ensure that our personal information remains protected and our privacy remains intact.

Are you looking for ways to ensure the privacy and security of yourself, your family, and your business?

Our training courses may be just what you need. Do not wait until it is too late. Our courses adopt a hands-on approach, prioritizing practical application over theory.

Get in touch with us at info [at] digitaltran.eu

After considering your application, we will share a link with you where we can in all security do our training. Groups remain small so that everybody can follow.

Here are just some examples where governments want to control everything with the help of social media (corporations):

Justin Trudeau Hijacks Canada’s Healthcare ...”
(link to the ‘Gateway Pundit’ with officials’ videos)


Here is a video about the internet censorship – is it coming?

Old Laptops? Do you know what to do with them?

Old Laptop by Josep Monter Martinez on Pixabay

Do you have an old 64-bit laptop where Microsoft Windows 10/11 does not work anymore? There is a solution to bring back most of your laptops to life – in other words “recycling”.

We know that this last year, computer prices increased. Why not recycle your old computers / laptops?

Many Europeans will not have the money to buy new hardware since too many energy bills will come upon them with heavy increases that can go from 3 to 5 times the nominal price from last / this year, or even more. For instance, in Germany companies are already complaining that they get electricity invoices with 5 times the prices that they paid previously without speaking yet of the heating, maybe another 3 to 5 times too.

Massive unemployment is already in discussion. Now you should understand why many Europeans are unable to buy new computers.

What can be done with old computers / laptops?

We already heard about Linux distribution systems. Major ones are Debian, Ubuntu, Fedora, openSuse, … This major systems require a lot less resources than Microsoft Windows, but it could be that your laptop is already over 10 old, even up to 20 years. So we need something even more lighter in resources.

There are a few light distributions, but one that stands out is the “Linux Lite”. Here are some minimal specs:

CPU 1 GHz with 2 cores
RAM 768 MB (0.75 GB) – as
for Windows 11 you need
a strict minimum of 4 to 8 GB
HDD / SSD 8 GB – as for Windows 11 you
need a minimum of 64 GB
‘BIOS’ UEFI or old BIOS – as for
Windows 11 you need UEFI
and TPM version 2
Graphic card 3D video card with only 256 MB
Display VGA with 1024 x 768 and above

How to proceed?

1. Download the ISO – https://www.linuxliteos.com
(you can contribute financially something small, or if you cannot just click on $ 0, then the Download button)

2. Download 64 bit (if you know what a Torrent is, you may use it)

3. Wait a few seconds, a pop-up window or an icon may activate that it is showing the download in progress

4. Now download ‘balenaEtcher’ – https://www.balena.io/etcher

5. Follow the instructions on ‘Writing the Linux Lite ISO to a USB key / pen on Windows’ (https://www.linuxliteos.com/manual/install.html#installguide)

6. Follow the instructions in installing Linux Lite on your computer with UEFI … (https://www.linuxliteos.com/manual/install.html#installuefimode)

… or on a old BIOS system (https://www.linuxliteos.com/manual/install.html#installlegacymode)

How to use it?

Here you have a documentation about tutorials – https://www.linuxliteos.com/manual/tutorials.html

I found also this video on YouTube in how to parameterize and use the Linux Lite 6 – https://youtu.be/_yTICKxBkw8

Conclusion

I hope, I could convince you not to throw away functional computers but to give a new life – by far a lot cheaper.

In case you need help, please take contact with us at
” info [at] digitaltran [dot] eu ” or through our contact form on
https://digitaltran.eu.

Cyberattacks on Linux? Can it be prevented?

How common are cyberattacks on Linux?
Can we do something about it?

More common than you think. Do not get fooled by the hype:

“Linux is secure, stable, and flexible. It’s the most secure OS in the world!”

Sadly, nowadays it became a marketing tool and does not correspond to the reality. It is still true that is better than Microsoft Windows regarding stability and flexibility, but Linux has more or less the same security issues as a Windows system.

An Operating System is as secure as the developer and user take care about their own clean security habits.

Let’s dive in and see how to counteract cyberattacks, just by taking some steps.

By doing some simple actions you may avert a serious disaster – public shame, getting fired, even go to court to explain ‘Why was I careless?’ where thereafter it is very difficult to get a new job.

First some small simple stats*. Areas used:

  • Web services: 96% of the top 1 million servers are run by a Linux system
  • Smartwatches
  • Aerospace industry
  • More and more workstations and file servers
  • Cloud services are run mostly by a Linux system

Major countries which are exposed to attacks are*:

  • USA
  • Germany
  • China
  • France
  • Hong Kong (not a country as per decree, belongs to China)

Now with the war, these stats could have changed. It was noticed an active increase in attacks.

It seems that non-ethical hackers have the upper-hand and get rich. Did I miss my vocation? Just kidding!

NEVER go that route because either you land in a grave, 6-feet under, or land in jail for a very long time!

What can be done?

1.During the installation process use strong passwords.
Many users, privately or at work, still use weak passwords as (cracked in less than a second):

“ I love you ”
“ 123456 ”
“ qwerty ”

Use a password manager (very easy to use). Personally I use one where in most web subscriptions I use over 700-bits passwords (an overkill but easy to setup and to use) – copy and paste!

Or use a long passphrase:
“Yesterday, I went in the evening @19:15 for a swim!”
Almost 190-bit password (takes decades to decode it). Of course do not use this passphrase. Use something that happened in your life, secret to you – easy to use and you will never forget.

A password or passphrase is a PERSONAL item and not to be given to anyone, including your boss!!! She/He wants it, ask for a Liability Release Form!**

In case you give it freely to your boss, it is the same you sign your resignation or she/he will put the blame on you for any mishap. Do not be afraid, she/he has access to your files you working on but with her/his own password. So it is traceable.

2. When you install a Linux or a Windows system the first thing to be done is ALWAYS – update your system:

– Graphical way:

     ‘Software’ → click Updates

– Through the ‘Terminal’:

Debian and Debian-based systems, for instance Ubuntu:

      sudo apt update && sudo apt upgrade -y

Fedora system:

      sudo dnf update -y

openSuse system:

      sudo zypper update -y

DO NOT FORGET to restart your system! Sometimes it is not required, but I always do it even for minor updates.

3. NEVER open an e-mail attachment if you do not know its origin!

By taking these three steps, you are protected about 95% of the time.

Still want to increase your chances of not getting hacked?

In most Linux systems, by default, the root account is locked. If someone has access to root, she/he can do everything in your system – the ‘god’ of all users!

During the installation create a normal account with administration privileges, hence the command word ‘sudo …’ + password to give access to root privileges – no activity, logged out automatically after a few minutes.

Generally every Linux system has an active firewall – that’s fine.

Another way to trap hackers, install ‘fail2ban’:

      sudo apt install fail2ban -y

      sudo dnf install fail2ban -y

On openSuse, just click https://software.opensuse.org/package/fail2ban, download and install it.

Restart your system!!!

Voilà, your got a protection of 99%. If hacked it has nothing to do with you but with the vendor.

In case you need more information or need some help in doing all these steps or even to further secure your server or workstation, do not hesitate in taking contact:

https://digitaltran.eu/#contact


* You may read in detail this article – very informative.

** More info, read this article.