US-CERT is aware of active attacks against linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as "phalanx2" is installed.

Of course be careful. Nothing is imuned. The issue you mention RHARV is aimed at SSH based servers. The average home user does not have this.

To me there's a big difference between a virus ( swine flu ) that spreads willy nilly to everyone, and me deciding, based on observation that RHARV has a lot of nice stuff at his house so I'm gonna find a way to go there and steal it.


John
ESI Gigaport HD+
Lenovo Turion II /4 Gig Ram/ Win7x64 be
15.6" Monitor
"The only Band is a Real Band"
www.wintertexaninfo.com/BANDS/JohnnyD.php