this post was submitted on 09 Jul 2023
384 points (92.7% liked)

linuxmemes

20686 readers
873 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 30 points 1 year ago* (last edited 1 year ago)

In general, a compromised system may be running any software the attacker might find useful, including, but not limited to:

  • keyloggers to find passwords that are in use in the company
  • software to copy sensitive files to a remote server
  • software to encrypt the system itself or (if the computer has access to other machines on the network) other computers
  • produce documents (think, mail) that purport to have been created by the user of the corrupted machine.