this post was submitted on 22 Aug 2023
63 points (97.0% liked)

Asklemmy

43831 readers
891 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy ๐Ÿ”

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
top 9 comments
sorted by: hot top controversial new old
[โ€“] Ziggurat@sh.itjust.works 39 points 1 year ago (1 children)

Most likely : Someone script kiddie tried to attack-it, and some user had a week password. There is tons of bot farm attacking any device connected to the internet all the time, as indiviual, we usually have a firewall/router between our PC and internet (so the whole family gets wifi), and keep all the "remote access services" off. But a telescope is typically the kind of infrastructure where "remote access" is necessary meaning that you're a target for attacker

[โ€“] ImplyingImplications@lemmy.ca 31 points 1 year ago* (last edited 1 year ago) (1 children)

There is tons of bot farm attacking any device connected to the internet all the time

A neat experiment is to configure an SSH server that has no users. It'll allow connections but it isn't possible to actually login. It'll also have a log where you can view login attempts. Within a few days of going online, your logs should be filled will tens of thousands of login attempts from IP addresses from around the world.

[โ€“] Maajmaaj@lemmy.ca 16 points 1 year ago (1 children)

Reading that just stressed me tf out.

You should see what gets sent to web servers. All sorts of exploit strings ranging from IIS to WordPress.

[โ€“] davefischer@beehaw.org 14 points 1 year ago (1 children)
[โ€“] FinancesDrone98@programming.dev 4 points 1 year ago (1 children)

I have found the one and only answer I will allow.

[โ€“] davefischer@beehaw.org 1 points 1 year ago

I happen to be in the middle of book #2 right now, ha ha.

[โ€“] planish@sh.itjust.works 8 points 1 year ago

A lot of these telescopes are on top of the tallest mountain around. Which in turn was probably pretty significant to whoever might have been dispossessed of the local area. So they can be surprisingly unpopular.

Like imagine if space aliens showed up, stole all the good land, killed loads of people, and then decided to build tools for their own notion of peaceful scientific exploration on top of Mount Everest, Mount Rushmore, and Half Dome.

Also, that Russian moon lander just crashed, so it could also be some kind of secret space cyber war of countries trying to make each other seem incompetent.

[โ€“] Anonymoose@infosec.pub 1 points 1 year ago

It could be a lot of things ranging from state threat actors looking for a toehold into a network or to cost the government time and resources or people doing it for the lulz.