- cross-posted to:
- hackernews@derp.foo
- cross-posted to:
- hackernews@derp.foo
Stealthy Linux rootkit found in the wild after going undetected for 2 years::Krasue infects telecom firms in Thailand using techniques for staying under the radar.
Zero useful info: what is the attack vector / vulnerability exploited? Without that info, this is useless
Well, most of us can relax I believe: The rootkit supports Linux Kernel versions are 2.6x/3.10.x
https://www.bleepingcomputer.com/news/security/krasue-rat-malware-hides-on-linux-servers-using-embedded-rootkits/The only thing I know runs that kernel version is my Wii because it needs an old kernel for ppc32 support
Be careful, one day you’ll boot it up only to find some hacker have set new and impossible to beat highscores.
Now that is helpful information - current distros being on 6.x and whatnot… Thanks!
From the article:
The researchers have so far been unable to determine precisely how Krasue gets installed.
So no one knows yet. But I feel that the existence of malware in the wild is newsworthy, even if we don’t know how it got there. Regardless, you and I probably don’t have to worry about it unless you’re a Thai telecom.
And unless we run a 3.x kernel as another commentor pointed out…
Hpw to combat stuff like this?
SELinux, grsecurity, containers, keep your system updated and don’t run random untrustworthy code.
This is the best summary I could come up with:
Stealthy and multifunctional Linux malware that has been infecting telecommunications companies went largely unnoticed for two years until being documented for the first time by researchers on Thursday.
Researchers from security firm Group-IB have named the remote access trojan “Krasue,” after a nocturnal spirit depicted in Southeast Asian folklore “floating in mid-air, with no torso, just her intestines hanging from below her chin.” The researchers chose the name because evidence to date shows it almost exclusively targets victims in Thailand and “poses a severe risk to critical systems and sensitive data given that it is able to grant attackers remote access to the targeted network.
It then proceeds to hook the syscall, network-related functions, and file listing operations, thereby obscuring its activities and evading detection.
Rootkits are a type of malware that hides directories, files, processes, and other evidence of its presence to the operating system it’s installed on.
By hooking legitimate Linux processes, the malware is able to suspend them at select points and interject functions that conceal its presence.
Intercepting the kill() syscall also allows the trojan to survive Linux commands attempting to abort the program and shut it down.
The original article contains 288 words, the summary contains 192 words. Saved 33%. I’m a bot and I’m open source!
The most incredible part of this is it isn’t even a Linux flaw. The key to this exploit is downloading shit software, an issue that exists universally on any operating system (especially Windows).
How to mitigate the risk? Don’t let your idiot user download malware.
So…package manager?
I’m assuming this meme wasn’t meant all too serious by the poster (but judging by the downvotes quite a few people took it seriously).
However, it’s not like Linux is magically immune to security vulnerabilities. It’d be foolish to think your system is invulnerable just because you’re using a Linux distribution.
Sadly, too many Linux users still believe there are no viruses on Linux.
You can blame Apples marketing.
There’s also a large number of Linux users that act like it’s infinitely easy and complication free.
with certain distros it is, now don’t expect that from all of them tho
How does Apple relate to this?
If you’re using Linux 3.10 in current year (not airgapped) it’s on you