← Back to context

Comment by jand

12 hours ago

sry to be that guy (with a snarky comment):

> Over the 20+ years, I witnessed a few security incidents.

As you said, the attackers who breached your system had ssh root access and you had no chance to detect them.

Attackers attack for a reason. For targets like my servers, they mostly want to install mining software or a DDoS bot. This is detectable via cpu or network monitoring.

I assume if someone wanted to extort money from me after encrypting the disks on my servers, I would also be somehow informed.