Announcement: California Welding Institute will be closed December 8th–30th.

Always verify file types using the file command in Linux (e.g., file bb.txt ) rather than relying on the suffix.

Leaving generic files like bb.txt on a production server can create "noise" that makes it easier for actual malware to hide in plain sight. Bash Pattern Matching (Part 2) - Alex's Blog

Unlike common malware that uses random strings, BusyGasper used a deceptively simple naming convention for its components on the infected device's FTP server. Among a list of system-looking files like privapp.txt and supersu.cfg , was found to be a BusyBox v1.26.2 ELF file . By masquerading as a text file, bb.txt aimed to:

For most developers, bb.txt is just the second file in a series. You’ll find it in countless tutorials on Stack Overflow and Unix Stack Exchange . It’s frequently used to demonstrate:

In Subversion (SVN) tutorials, bb.txt is a classic example of a renamed file that loses its history if not tracked correctly. 2. The "Bad" bb.txt: The BusyGasper Spyware

In 2018, security researchers at Kaspersky's Securelist uncovered a sophisticated Android spyware campaign dubbed .