Never-before-seen Linux malware gets installed using 1-day exploits

Discussion in 'all things UNIX' started by 1PW, Mar 12, 2024.

  1. 1PW

    1PW Registered Member

    Joined:
    Apr 2, 2010
    Posts:
    1,971
    Location:
    North of the 38th parallel.
     
  2. longshots

    longshots Registered Member

    Joined:
    Oct 20, 2017
    Posts:
    557
    Location:
    Australia
    Not much to see here - move along.
    But, infn you want some info don't bother with the article and go straight to the comments.
    Smiley face goes here but we're to grown up for that.
     
  3. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,884
    If you install from the repositories, you will never see malware. They scare us to force us to sign up for useless security software.
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,656
    Location:
    The Netherlands
    I actually do think it's quite interesting. It shows us that Linux should be secured and monitored properly on corporate networks and is not immune to malware.

    Wrong, I guess you didn't read this thread:

    https://www.wilderssecurity.com/thr...untu-hit-with-another-crypto-scam-app.453603/
     
  5. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,025
    Location:
    Member state of European Union
  6. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,233
    Meh. The article starts with never seen before exploit panic panic, then turns out you need to run Magento, server for this to be even applicable. I also don't like when articles focus on what malware does ONCE installed - but the interesting thing is what happens before, not after. It's like saying, once you put your finger in boiling water, wait, why would you.
    Mrk
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,656
    Location:
    The Netherlands
    And your point is? I don't know much about Linux, but it seems like the Snap store is used by most users on Ubuntu, or isn't this true?

    I have to disagree. The fun starts when malware has already bypassed AV and it still can't achieve its goal. That's the whole point of so called behavior blockers.
     
  8. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,233
    If someone manually downloads a binary, runs it - and then things happens, that's not quite remarkable. If something can exploit a service, or perhaps there's a memory usage problem in something like JS in browsers, that's a completely different thing. How the intruders gets in is 99% of the story. But that doesn't make for alarmist headlines.
    Mrk
     
  9. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,075
    Location:
    Canada

    +1 :thumb:
     
  10. Bertazzoni

    Bertazzoni Registered Member

    Joined:
    Apr 13, 2018
    Posts:
    660
    Location:
    Milan, Italia
    Indeed, it qualifies as clickbait.
     
  11. chrisretusn

    chrisretusn Registered Member

    Joined:
    Jun 16, 2004
    Posts:
    1,676
    Location:
    Philippines
    When ever I see a headline like that, alarm bells start going of. the click bait alarm bell and there is not to this story than the headline, like not what the headline implies. Just like this one.
     
  12. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,656
    Location:
    The Netherlands
    I'm sorry but I believe you guys don't make any sense.

    This malware was installed on Linux servers via some exploit. Which means that whatever anti-exploit tool they were using (if any at all) failed to block it. After this, the malware could apparently do whatever the heck it wanted since AV/behavior blocker also didn't step in. So that's why it's always very interesing to know what the object of this malware was so that behavior blockers can be trained to block this, the next time this type of malware is somehow able to run on after AV bypass. Nothing more, nothing less.
     
  13. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,233
    If you read the article, this happened on a Magento ecommerce server - you need to run this thing to begin with - open port, accepting requests on the Internet as part of your functionality. And this is no different than any 1-click exploit for any service. Nothing to do with Linux per se, except the service runs on Linux. Most likely, such servers do not run any AV at all, because such tools are rarely used on Linux (not that they're needed anywhere, but hey). Without specific details on how the exploit works, it's fearmongering.
    Mrk
     
  14. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,656
    Location:
    The Netherlands
    I still don't see your point. Do you mean that this article makes Linux look bad or what? But how is this any different than some Windows user being hacked via some Firefox exploit? This is how stuff works, most of the time hackers use some third party app like a browser or office software to get malware up and running on for example Windows or macOS. Sometimes they combine a browser exploit with an OS exploit. At the end of the day, this malware was running on Linux, so the interesting part is that apparently malware running on Linux is just as dangerous as on Windows, since they have the same capabilities.
     
  15. Mrkvonic

    Mrkvonic Linux Systems Expert

    Joined:
    May 9, 2005
    Posts:
    10,233
    The point is, this has nothing to do with Linux.

    You have a web server, it has a vulnerability, and through the vulnerability, attackers can exploit the system. The fact it runs on Linux is irrelevant.

    This is not a end user problem - it's not a home system where you GO somewhere and maybe land on a problem, and your browser gets exploited. This is a server, wholly designed to actively accept requests all the time.

    Malware running on Linux is also not important in this context - I can write malware in 4 seconds for any OS - how it gets deployed is all that matters. In this case, the problem isn't with Linux, but the service that was exploited. Again, nothing special or different from a million other such examples.

    Mrk
     
  16. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,656
    Location:
    The Netherlands
    It is very much relevant that it runs on Linux. Most people probably think that malware running on Linux (server or PC) can't do any serious damage. And again, if some user gets hacked via Firefox, and he's running Windows, then it also hasn't got anything to with Windows with your way of thinking. But why do you feel the need to keep stressing this?

    Who cares that it's a server? And yes, of course servers are hacked in a different way than how PC's get hacked. Normally speaking there are two ways to hack a system, either automatically via exploit, or manually via user install. It's the same on both servers and PC's.

    Exactly, Linux was not exploited in this particular case, but Linux also has its fair share of holes. And apparantly these Linux servers weren't secured or monitored properly. That's why these articles are so important, to spread awareness about Linux based malware. There is nothing ''clickbaity'' about this, see links for more info.

    https://arstechnica.com/information...cessful-exploit-of-a-linux-server-looks-like/
    https://medium.com/@tesla8877/explo...ating-system-real-world-examples-d05739baed4b
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.