" Once root access has been obtained, a rootkit known as
"phalanx2" is installed.
"Phalanx2 appears to be a derivative of an older rootkit named
"phalanx". Phalanx2 and the support scripts within the rootkit, are
configured to systematically steal SSH keys from the compromised
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.