A worm that takes advantage of a vulnerability in the PHP scripting language to attempt to gain access to a computer or device. Linux.Darrloz uses the vulnerability to seek administrative privileges by providing commonly-used login usernames and passwords. If Darrloz gains access to the computer, it leaves a backdoor on the infected system or device that allows the cyber criminal to issue commands at any point in time.
While Linux.Darrloz primarily targets Linux distributions, the worm has received considerable attention from the security industry as a potential security threat to the Internet of Things (IoT). There is evidence of Darrloz variants having been created specifically for chipsets utilized by home routers, set-top boxes, entertainment devices, security cameras and similar Internet-enabled devices.
This has prompted concerns that as common, everyday objects like household appliances, security systems and automobiles become more and more Internet-enabled (i.e. The Internet of Things), security threats such as Linux.Darrloz could present considerable risks to computers and connected devices as well as those who use them.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
Webopedia's student apps roundup will help you to better organize your class schedule and stay on top of assignments and homework. Read More »List of Free Shorten URL Services
A URL shortener is a way to make a long Web address shorter. Try this list of free services. Read More »Top 10 Tech Terms of 2015
The most popular Webopedia definitions of 2015. Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »