13 points

Sounds like it should at least be noticeable if you monitor resource usage?

permalink
report
reply
10 points

That’s how some people found it, but it would disappear when someone would login to investigate.

permalink
report
parent
reply
9 points

Sure, but it’s still fairly detectable when it’s on a server at least, as long as you have monitoring. Just a bitch to pinpoint and fix.

permalink
report
parent
reply
4 points
*

Vulnerable to 20,000 misconfigurations, But thearted by 42 billion different simple checks that we all do anyway.

5 minute load greater than 80% of the number of cores? That’s an alarm…

permalink
report
parent
reply
3 points
*

Yes, but they replace common tools like top or lsof with manipulated versions. This might at least trick less experienced sysadmins.

Edit: Some found out about the vulnerability by ressource alerts. Probably very easy in a virtualized environment. The malware can’t fool the hypervisor ;)

permalink
report
parent
reply
2 points

Not quite the monitoring I’m talking about though.

Basically, it seems like this would be a nightmare for a home user to detect, but a company is probably gonna pick up on this quite quickly with snmp monitoring (unless it somehow does something to that).

permalink
report
parent
reply
41 points

No mention of transmission methods as far as I understand the article

permalink
report
reply
46 points

The whole thing sounds fishy. Like it’s trying to convince people Linux is inherently vulnerable.

exploiting more than 20,000 common misconfigurations

Like WTF?

permalink
report
parent
reply
2 points

It’s kind of an iffy assertion. That’s maybe the number of files it scans looking for misconfigurations it can exploit, but I’d bet there’s a lot of overlap in the potential contents of those files (either because of cascading configurations, or because they’re looking for the same file in slightly different places to mitigate distro differences). So the number of possible exploits is likely far fewer.

permalink
report
parent
reply
1 point
*

maybe the number of files it scans looking for misconfigurations

So how did it get into the system to be able to scan configuration files?

permalink
report
parent
reply
-1 points
*

Like it’s trying to convince people Linux is inherently vulnerable.

I’m typing this reply from a machine running KDE Plasma on top of Linux Mint 22.

I’m not sure what precisely what you mean by “inherently” but I’d like to point that “Linux” has security problems all over the place; the kernel has issues, the DEs have issues, the applications have issues. It’s more secure than Windows but that’s not a very high bar.

permalink
report
parent
reply
3 points

I’ve been using Linux since 2005, and I’ve heard all sorts of stories about Linux having “security problems”, and almost every time it turns out to be a problem that can’t be exploited on it’s own. but requires the use of other vulnerabilities.
The only exception I can recall is the zx util compression tool, which was detected before it was rolled out.

Zero day vulnerabilities have been non existent for 20 years to my knowledge.

permalink
report
parent
reply
10 points

They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.

permalink
report
parent
reply
65 points

Can’t be infected if I keep wiping my partition for a new shiny distro

permalink
report
reply
35 points

Your install USB is infected by a rookit and reinstalls itself on connect.

permalink
report
parent
reply
23 points

Jokes on you, the rootkit is likely my own and I just forgot about it.

permalink
report
parent
reply
21 points

It’s tough being an ADHD Hacker

permalink
report
parent
reply
3 points

This was my first thought. I haven’t had the same os installed for a few months max, nevermind 3 years

permalink
report
parent
reply
57 points
*

This story reeks of FUD.

exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets,

Because a “common misconfiguration” will absolutely make your system vulnerable!?!
OK show just ONE!

This is FUD to either prevent people from using Linux, or simply a hoax to get attention, or maybe to make you think you need additional security software.

permalink
report
reply
25 points

Crowd strike looking for a new market?

permalink
report
parent
reply
22 points

Unfortunately they are already in the market and making a mess: https://www.theregister.com/2024/07/21/crowdstrike_linux_crashes_restoration_tools/

permalink
report
parent
reply
2 points

ssh with an easy to guess root password?

permalink
report
parent
reply
3 points
*

Wouldn’t that simply be a user mistake?
It’s kind of like saying if you remove the password completely, it’s vulnerable.

permalink
report
parent
reply
0 points

Millions of systems shut down by dumb microsoft os.

permalink
report
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 5.2K

    Posts

  • 101K

    Comments