Alright, I think I've found it. Go to Administration -> Scripts -> Ping on your Zabbix.
Funny thing is that I can't look at that Zabb.gif file even on Windows because Windows Defender blocks it immediately, lol
UPD:
So, it uses IRC to communicate with master, scans ports, looks for root vulnerabilities in a bunch of kernel versions (old versions, but still)... I don't even know what else I should say.
Here's an article on it https://devcentral.f5.com/articles/t...alysis-perlb0t
I don't know whether it is an internal Zabbix breach or the weak passwords that I used for Zabbix users. But this is certainly the way it gets on the machine.
Funny thing is that I can't look at that Zabb.gif file even on Windows because Windows Defender blocks it immediately, lol
UPD:
So, it uses IRC to communicate with master, scans ports, looks for root vulnerabilities in a bunch of kernel versions (old versions, but still)... I don't even know what else I should say.
Here's an article on it https://devcentral.f5.com/articles/t...alysis-perlb0t
I don't know whether it is an internal Zabbix breach or the weak passwords that I used for Zabbix users. But this is certainly the way it gets on the machine.
Comment