I will try to explain how the "virus" works
The ultimate goal of the attack is to gain access to the server's console, or at least to the Robust server. Unfortunately, many of the servers directly allow access to ports 20, 22, 139, 8003, 3306, 3389. Some change the port number to "non-standard" hoping to hide it - naive! Passwords? Are you joke????????
For those who make this mistake, the attack ends here - successfully and with unlimited damage. Read this:
https://opensimworld.com/post/105787
What if you did protect yourself? The hacker tries the next step:
Each OpenSIM server exchanges assets with the others. This happens when you "wear" or when you "rez" object on the ground. This allows you to use things created on other servers and see the avatars of visitors. This is very nice but....besides the "normal" assets opensim servers also exchange an asset of type "LSLBytecode" (opss what code?) and "Link" (hmmmmm Where does this link point to and what is being loaded?)...
Whatever the hacker wants!
Uploaded script start to work like proxy between hacker and local machine. I cannot understand more, because hacker try to attack Robust, SQL and SSH some time and leave (in my server all these is not accessible this way)
A defense against that?
1.NEVER allow to visitors or users to BUILD!!!
2.NEVER rez or wear in "god mode"!
3.NEWER allow to script to rez anything!
And again USE ROUTER! If you is on datacenter use TCP Wrappers! Firewall NOT WORK against proxy already inside....