275

Antivirus provider Kaspersky uncovers a sophisticated piece of 'StripedFly' malware camouflaged as a cryptocurrency miner that's been targeting PCs for more than five years.

you are viewing a single comment's thread
view the rest of the comments
[-] sir_reginald@lemmy.world 93 points 8 months ago* (last edited 8 months ago)

this makes use of an old windows specific vulnerability. Linux is only mentioned on the title, not again in the whole article. clickbait.

edit: downvote me if you want, but the original article didn't say a thing about Linux.

[-] Salamendacious@lemmy.world 35 points 8 months ago

https://www.bleepingcomputer.com/news/security/stripedfly-malware-framework-infects-1-million-windows-linux-hosts/

On Linux, the malware assumes the name 'sd-pam'. It achieves persistence using systemd services, an autostarting .desktop file, or by modifying various profile and startup files, such as /etc/rc*, profile, bashrc, or inittab files.

[-] Buffalox@lemmy.world 46 points 8 months ago

That's from a completely different article.

And it doesn't say how this is achieved without already having root privilegies. I'm not sure I believe this can in fact infect a Linux system, except if it's already heavily compromised, for instance by a user logging in as root as default.

[-] LostXOR@kbin.social 9 points 8 months ago

.bashrc and .profile can be modified without root, as can autostarting .desktop files. I think systemd and anything in /etc require root though.
Also a lot of users set sudo to not require a password (I am guilty of this) which makes privilege escalation easy.

[-] abhibeckert@lemmy.world 3 points 8 months ago* (last edited 8 months ago)

It is a different article, but both articles are simply reporting research by Kaspersky, and Kaspersky goes into quite a bit of depth covering the Linux side of the threat, which is very real. PCMag focuses mostly on the windows side, because it's a windows focused site.

This isn't a single exploit, this is a "framework" that can take advantage of multiple exploits and will use which ever one it can find. You don't need to be "heavily compromised" you just need to be vulnerable to one of the compromises. And you definitely don't need root either.

[-] LDerJim@lemmy.world 1 points 8 months ago

Maybe if root is shared via SMB1 and is rw

[-] Buffalox@lemmy.world 5 points 8 months ago* (last edited 8 months ago)

Not possible AFAIK, I don't use anything Microsoft, but AFAIK SMB1 shares on Linux are through Samba, and you can't just enable write permissions without root. So as I stated before, the Linux system needs to be already compromised.

[-] LDerJim@lemmy.world 1 points 8 months ago

Users can configure the system however they want.

[-] Salamendacious@lemmy.world 0 points 8 months ago

I'm not a Linux user (except for Chromebook and Android) so honestly the Linux section wasn't personally important to me. Another commentor wanted more information on the Linux side so I looked briefly if I could find an article that might be helpful. Linux terminology is all Greek to me so I honestly wouldn't know. I thought the article was interesting and I thought other people might find it interesting. The Linux part didn't even enter into my mind.

[-] Buffalox@lemmy.world 19 points 8 months ago* (last edited 8 months ago)

It does include this:

quietly spread across a victim’s network, including to Linux machines.

But that's a completely ridiculous lack of detail of any actual vulnerability. Smells like bullshit.
The quote from OP is from a different article.

[-] Salamendacious@lemmy.world 10 points 8 months ago* (last edited 8 months ago)

I wasn't intentionally trying to imply that it came from the article. That's why I posted the naked link. I wasn't really thinking about the Linux component when I posted the article.

[-] Buffalox@lemmy.world 11 points 8 months ago

That’s why I posted the naked link.

Which is perfectly fine and dandy. I think some people just had a knee jerk reaction, based on a misunderstanding of context.

[-] hornedfiend@sopuli.xyz 17 points 8 months ago

It does though: "On Linux, the malware assumes the name 'sd-pam'. It achieves persistence using systemd services, an autostarting .desktop file, or by modifying various profile and startup files, such as  /etc/rc*, profile, bashrc, or inittab files."

So technically useless . it can't do shit.

[-] Socsa@sh.itjust.works 2 points 8 months ago

It can pwn poorly configured dev systems.

this post was submitted on 29 Oct 2023
275 points (93.9% liked)

Technology

55690 readers
3446 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS