Guy, just think if your VPS (Virtual Private Server) was hacked without you knowing… That's what SystemBC malware does; it compromises servers—such as your VPS—so the criminal has private access. That's not ideal, is it?
What is SystemBC?
SystemBC was discovered for the first time in 2019 when hackers used it to deliver ransomware and other malicious code. Now we have improved upon its capabilities. When SystemBC is run on your server, it unclear the hacker's true location when they're using your VPS to send their identified traffic.
This would be like a residential burglary when a thief burglary breaks into your home and steals your internet to commit crimes—they get all the benefits while you get all the burdens.
What attracts hackers to VPS?
Hackers are enamored with VPS systems because:
• They’re always online, unlike your home computer.
• Many VPSs have old, unpatched vulnerabilities.
• One VPS in Alabama had 161 unpatched vulnerabilities that were simply waiting to be cracked!
It’s akin to leaving all of your doors and windows unlocked.
Who’s on the other end consuming this illicit traffic?
The malware does not remain idle. Criminal groups will rent out the hacked servers to generate income. Here are some examples:
• REM Proxy – sells hacked VPS traffic.
• Russian scraping groups – utilize them to data scrape.
• Vietnamese proxy services – profit by using them too.
The creators of SystemBC even hack into WordPress sites and sell the stolen logins.
How significant is the issue?
Researchers observed one VPS sending 16GB of stolen traffic in just one day. That's a significant amount! Over 1,500 infected VPS systems operate daily as part of this network. Even law enforcement has a difficult time shutting it down.
What actions should I take?
For those who operate a VPS, the answer is simple: keep it updated and patched. Do not have open security holes, keep them closed. Hackers are always looking for a chance to hack into your machine.
For those who do not run a VPS, just remember that the hackers do not just sit in basements; they rent servers, use cloud hosts running AWS servers, and fully take advantage of minimal protections.
Final thoughts
I laugh a bit here because it is sad. VPS providers promotes how secure their servers are when most of their servers are wide open. I double check my own setups, how do you monitor your server(s) - do you constantly keep your VPS update or just assume nothing bad will happen? Trust me, you don’t want to be the idiot who forgot their VPS server is just a hack waiting to happen.