1 point

Thousands!? Shit. That’s like all of them!

permalink
report
reply
61 points

Shouldn’t be this hard to find out the attack vector.

Buried deep, deep in their writeup:

RocketMQ servers

  • CVE-2021-4043 (Polkit)
  • CVE-2023-33246

I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.

Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.

permalink
report
reply
12 points

There’s also a buried reference to using a several-years-patched gpac bug to gain root access before this thing can do most of its stealth stuff.

Basically, it needs your system to already have a known, unpatched RCE bug before it can get a foothold, and if you’ve got one of those you have problems that go way beyond stealth crypto miners stealing electricity.

permalink
report
parent
reply
53 points
*

This story reeks of FUD.

exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets,

Because a “common misconfiguration” will absolutely make your system vulnerable!?!
OK show just ONE!

This is FUD to either prevent people from using Linux, or simply a hoax to get attention, or maybe to make you think you need additional security software.

permalink
report
reply
22 points

Crowd strike looking for a new market?

permalink
report
parent
reply
19 points

Unfortunately they are already in the market and making a mess: https://www.theregister.com/2024/07/21/crowdstrike_linux_crashes_restoration_tools/

permalink
report
parent
reply
2 points

ssh with an easy to guess root password?

permalink
report
parent
reply
3 points
*

Wouldn’t that simply be a user mistake?
It’s kind of like saying if you remove the password completely, it’s vulnerable.

permalink
report
parent
reply
64 points

Can’t be infected if I keep wiping my partition for a new shiny distro

permalink
report
reply
34 points

Your install USB is infected by a rookit and reinstalls itself on connect.

permalink
report
parent
reply
21 points

Jokes on you, the rootkit is likely my own and I just forgot about it.

permalink
report
parent
reply
19 points

It’s tough being an ADHD Hacker

permalink
report
parent
reply
3 points

This was my first thought. I haven’t had the same os installed for a few months max, nevermind 3 years

permalink
report
parent
reply
35 points

Seeing the diagram, it only attacks servers with misconfigured rocketMQ or CVE-2023-33426, which is already patched. Am I understanding this correctly?

permalink
report
reply
8 points

It probably has a large database of exploits it can use. The article claims 20k, but this seems to high for me.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 5.2K

    Posts

  • 100K

    Comments