As a vulnerability, hackers use weak passwords and standard accounts without additional authorization methods. Therefore, cybercriminals use brute force to hack Linux network devices – guessing passwords.
The purpose of the attacks is basically to establish a backdoor – to gain covert access to critical information. Once remotely accessed, the compromised device is used for mining, phishing, shadow financial transactions, or other cyberattacks.
Microsoft experts recommended that you set only complex passwords, use multi-stage authentication methods, and update the software regularly.
Source: Ferra

I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.