If the above decides to continue, the code appears to be parsing the symbol
tables in memory. This is the quite slow step that made me look into the issue.
That is from the original find. Not sure the relevance of it and this being proof for it being “on purpose”. But that is the origin of the slowness.
The slowness is on purpose? To help identify the sshd in question to the attacker which nodes are compromised? What reason(s) could there be?
That is from the original find. Not sure the relevance of it and this being proof for it being “on purpose”. But that is the origin of the slowness.
I doubt that was intentional, they would likely want to hide that latency but the CPU time required to scan everything just is what it is.
https://bsky.app/profile/filippo.abyssdomain.expert/post/3kowjkx2njy2b