this post was submitted on 09 Jul 2023
400 points (92.7% liked)

linuxmemes

19680 readers
72 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 31 points 11 months ago* (last edited 11 months ago)

In general, a compromised system may be running any software the attacker might find useful, including, but not limited to:

  • keyloggers to find passwords that are in use in the company
  • software to copy sensitive files to a remote server
  • software to encrypt the system itself or (if the computer has access to other machines on the network) other computers
  • produce documents (think, mail) that purport to have been created by the user of the corrupted machine.