Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Debian Linux

Malware Found Hidden In Screensaver On Gnome-Look 611

AndGodSed writes "OMG! UBUNTU! Reports the following: 'Malware has been found hidden inside an innocuous 'waterfall' screensaver .deb file made available on popular artwork sharing site Gnome-Look.org. The .deb file installs a script with elevated privileges designed to perform a DDoS attack as well as keep itself updated via downloads. The dodgy screensaver in question has since been removed from gnome-look, and this incident was a very basic, if potentially successful, attempt.'" A similar report at Digitizor.com says that similar malware was also found in a theme called Ninja Black. For those affected, both sites also provide instruction on cleansing your system.
This discussion has been archived. No new comments can be posted.

Malware Found Hidden In Screensaver On Gnome-Look

Comments Filter:
  • Re:Not more safe (Score:5, Interesting)

    by _merlin ( 160982 ) on Wednesday December 09, 2009 @06:47PM (#30382248) Homepage Journal

    It looks like it's following the same pattern as Windows malware, too: make a cool screensaver, post it to sharing sites, hope people tell their friends about it. That was a common malware vector for Windows in the early part of this decade. Next there'll be dodgy "codecs" on pr0n sites, and once people start using malware scanners for Linux, they'll make dodgy fake antivirus software to con gullible users. Netbooks may be great for attracting attention to Linux, but we have to remember that this will include the kind of attention that no-one wants.

  • Re:Not more safe (Score:5, Interesting)

    by Anonymous Coward on Wednesday December 09, 2009 @06:49PM (#30382268)

    You kind of have a point, but the fact is, you need root privileges to install a .deb, and I have quite successfully installed gtk/gtk2 themes/icons/etc without admin privileges. If I downloaded a .deb from a random site and then installed it, it would be just like running a .exe on windows, but for most things I need to do on linux, I don't actually have to take that risk, while on Windows it seems everything is a .exe. Not sure about screensavers, but it seems this was, like 90% of viruses for any platform, a hack relying on stupid users elevating the virus to root authority themselves.

    Repositories are getting a lot better too, I don't use ubuntu any more but when I left the PPA was in ascendancy, which seemed to allow a much better enforcement of security while still letting 3rd party stuff in.

  • Re:Not more safe (Score:3, Interesting)

    by sopssa ( 1498795 ) * <sopssa@email.com> on Wednesday December 09, 2009 @06:50PM (#30382286) Journal

    Any (good) linux sysadmin knows that there has been many Linux worms in the history. Yes, history. You're also referencing to a 2003 Windows worm here.

    Conficker aside, such worms are pretty much in history. Most malware now a days comes via trojans, and any OS can't protect against that unless it's totally locked down (like iPhone)

  • Re:Not more safe (Score:5, Interesting)

    by nurb432 ( 527695 ) on Wednesday December 09, 2009 @07:07PM (#30382476) Homepage Journal

    Except one would hope that you could trust what you get from a site like this. Not everyone can scour the source/binary of every app they get from a 'trusted' site.

    And if you cant trust the 'trusted' sites for the free stuff, then the entire FreeOS movement is dead in its tracks.

  • Re:Not more safe (Score:3, Interesting)

    by DragonWriter ( 970822 ) on Wednesday December 09, 2009 @07:08PM (#30382486)

    Most malware now a days comes via trojans, and any OS can't protect against that unless it's totally locked down (like iPhone)

    There's a middle ground that can maximize protection against trojans (of course, nothing can protect against completely unwary users), and that's using something a model where untrusted apps are (whether by running through app-specific accounts or otherwise) required to be given fairly finely grained permissions on installation before accessing resources.

    While Linux distros provided somewhat more protection against users being unknowingly tricked into performing dangerous tasks by providing elegant, non-intrusive ways to provide the control users need without always running as a superuser before Windows did much in that regard, it shares with Windows a fairly all or nothing security model in many regards that is particularly susceptible to trojans.

  • Re:Not more safe (Score:3, Interesting)

    by Goaway ( 82658 ) on Wednesday December 09, 2009 @07:08PM (#30382500) Homepage

    And thus you raise the threshold for entry for new third-party software.

  • Re:Not more safe (Score:5, Interesting)

    by digitalunity ( 19107 ) <digitalunity@yah o o . com> on Wednesday December 09, 2009 @07:33PM (#30382738) Homepage

    Here's an idea. Feel free to agree, disagree, tear it apart, whatever...

    Why not have a kernel network access logging module with a userland process that periodically reports to users which programs are accessing the TCP/IP network? Say once a week or once a month or something. The number of programs that do this for many users is quite low. Probably Firefox, Thunderbird, Opera, uTorrent, a short list of other programs. Users then have an opportunity to ignore those programs on future reports. Users now have a good idea if there are changes to their system that might affect security.

    There would still be opportunity for malware to access the internet, but users would either 1) notice it or 2) it would make the malware work in very complicated, noticeable ways(like uploading data to a website using a URL).

  • Re:Not more safe (Score:4, Interesting)

    by mR.bRiGhTsId3 ( 1196765 ) on Wednesday December 09, 2009 @07:38PM (#30382792)
    I'm sorry, you have no idea what you are talking about. Sudo is not an implicit privilege gain. You have to manually request elevation. The reason it looks implicit is because all of the applications that ever need elevated privileges come with launchers that do the work for you. Sudo can also be configured to function the same as su (OpenSUSE) ships it that way I believe. The same is true of the new policykit. Similarly, Vista is not an implicit elevation either. The continue prompt only occurs for administrator accounts because they are flagged with a token on login that mark them as administrators. They are required to manually take action. Furthermore, this function can be disable in group policy in order to force a password entry in the same way that non-admin users have to authenticate to perform system changes. The only reason it occurs automatically is through application manifests and heuristics. Both of these cases are explicit elevations at the behest of the application author that the user can approve or cancel.
  • Re:Not more safe (Score:4, Interesting)

    by isorox ( 205688 ) on Wednesday December 09, 2009 @07:38PM (#30382794) Homepage Journal

    Actually it would really suck if Windows had just one Microsoft verified "app store" where everything is controlled like with iPhone.

    Yes it would, and in this would I would add the google repository, and perhaps the apple repository. Anyone could set up a repository (same as you can with debian), and sign their packages, but if they got compromised, or let crap in, then I'd be wary of using them in the future.

    The problem with the iphone appstore is there's only one. You cant add a competitors.

  • Re:Not more safe (Score:1, Interesting)

    by Anonymous Coward on Wednesday December 09, 2009 @07:44PM (#30382864)
    "Let's continue to pretend Windows is XP Pre-SP2 where the computer gets infected within 30 seconds of being connected to the internet. Let's pretend that service pack 2, which shipped in 2004, doesn't exist. SP2 which by default had the firewall blocking internet access to potentially vulnerable Microsoft services. Let's pretend that the two new versions of Microsoft client OS are likewise not protected, or don't exist. Yet when we look at our updated-every-6-month Linux OS, we will ONLY consider the latest version!"
  • Re:Repositories! (Score:3, Interesting)

    by slack_justyb ( 862874 ) on Wednesday December 09, 2009 @08:10PM (#30383134)
    No but how about a balance between the two. Repos for what most people want. PGP signed debs for the 3rd parties. Straight deb for all those feeling frisky. It's not hard to warn people that, "Hey you're installing a unsigned package, chances are this will ruin your computer, sure you want to do that?" If a third party wants to distribute packages the least they can do is self-sign (bottom end), get a real cert (higher end).

    The inherent problem with the iPhone is that you can only go to one store to buy apps (namely iTunes). With Repos you can pick and choose which stores you trust and which you don't. Much like how I choose if I want to buy software from BigBoxMart or BestStolen. The Internet in general could (since I am using a store analogy apparently) be seen as buying stuff off the street. Yeah, the stuff looks cool and at these bargain prices you can't beat. But I do need to exercise some caution when I flash my wallet to some guy hanging out the back of a van.

    So yes, I agree, I'm not too hip on the one store to rule them all policy. But I do believe that the store concept actually has some utility to offer if given the ability to go to another store should I so choose later. I obviously don't want to exclude the random vendor on the street that is selling hand made crafts, or even the random kisok by the bus stop selling phones. I do however what to keep in mind the burly looking thug over there selling "Snoby" Radios. I think it is all a matter of getting people to get inside a way of thinking.

    To me, and that only applies to me, Mac OSX screams "Hey buy more shiny Apple stuff" (Security by insulating ones self by coolness). Linux says to me "Hey subscribe to a Repo because we are always changing stuff and you want to have the latest build." (Security by trust of subscription [or maybe sheer geekness]). Windows just looks like, "Hey we're cool with everyone, you want herpes? No problem we're cool with that. Want to do really neat spreadsheets? We're cool with that too." (Insecurity by being a software whore. We're just trying to please everyone.)
  • Re:Not more safe (Score:2, Interesting)

    by mysidia ( 191772 ) on Wednesday December 09, 2009 @08:20PM (#30383224)

    Both. You are imagining a false dichotomy where there is none.

    Getting as much of the 3rd party software as possible into the repository does not preclude raising the threshold of entry.

    Some software you want to fall below the threshold is no-name drive-by malware.

  • Re:Not more safe (Score:2, Interesting)

    by Anonymous Coward on Wednesday December 09, 2009 @08:38PM (#30383380)

    So what? On my system any script or program can not be executed without my knowledge. Programs can not access outside of specific directories. They are totally ironed and sealed from each other.

    Example, I can not even open a picture from any other directory than ~/Pictures directory. And only application to do that is the Gwenview.
    Only place to run any script (or binary executable) is from ~/bin but it first need to be profiled to do so. So I can copy what ever binaries to that directory and they can not be executed if I do not give permission first from admin profile.

  • Re:Not more safe (Score:2, Interesting)

    by mr exploiter ( 1452969 ) on Wednesday December 09, 2009 @08:38PM (#30383382)

    The argument is still the same. I'd rather be able to tell someone who can that they may than tell them they may not.

    Anyone can try to fix it. Some may be better than others, but that's doesn't preclude someone from trying. Whereas, on competing systems you may not.

    This argument is starting to look stupid specially in a story like this.

    Any software that I use has to be made by someone I trust, there is no escape from that, no "but the source is available". I have to trust the maker.

    And giving excuses instead of assuming responsibility is not going to gain my trust. There have to be concrete steps to assure this not happens again. No excuses.

  • by philipgar ( 595691 ) <pcg2 AT lehigh DOT edu> on Wednesday December 09, 2009 @08:44PM (#30383448) Homepage
    ah yes, because linux applications have never had holes allowing someone to get a shell on a system, and users are always running the most up to date kernel that has no root exploits available for it. The main difference between windows and linux is that the linux kernel has so many different versions, and not all distros are using the same one, so that it's hard to choose which kernel vulnerability to exploit. if 99% of people used linux, and were using the same distribution (with mostly the same kernel), believe me, these exploits would exist, and we would see viruses hitting linux machines over the network. Already, there exist worms that have targeted linux machines.

    And saying the problem is not in the kernel but the software applications doesn't cut it either. The same could be said for many of the windows issues, it's just that the software applications in question are in every install and part of the windows user environment. It's no different than applications that might be part of the ubuntu user environment (gnome, samba, etc) etc.

    Phil
  • by maugle ( 1369813 ) on Wednesday December 09, 2009 @09:00PM (#30383612)
    To bolster your point: How did they find the name of the package? Only someone knowledgeable in Linux could've found that out, or the various locations it installed itself to

    To refute your point: Malware can get its hooks into Windows in a variety of different ways, and removal often requires specialized tools. For example, I had to remove one of those hideous fake-antivirus programs from a neighbor's computer. Real antivirus was no help. MalwareBytes Anti-malware couldn't get rid of it. Going into Safe Mode and manually cleaning things out didn't even work. I had to search the Internet and use a specialized tool to finally uproot that crap. (And, while I trusted it, the removal tool could have also been malware, I had no way to tell)

    So: Linux gets infected, smart user can eliminate it. Windows gets infected, smart user still needs to rely on either antivirus or malware-specific removal tools.
  • Re:Not more safe (Score:5, Interesting)

    by Thinboy00 ( 1190815 ) <thinboy00@@@gmail...com> on Wednesday December 09, 2009 @09:11PM (#30383714) Journal

    My mother managed to get some nearly-impossible-to-remove scareware on her (Windows) netbook. She swears up and down that she never visited any sketchy sites, had AV (but no anti-malware), etc. She was basically using it for several things:
    1) Visiting various newspapers' websites
    2) Webmail (a dedicated server for her business)
    3) Word processing (OpenOffice.org)
    4) Spider Solitaire
    5) A few online games (jigsaw puzzles, sudoku, presumably flash-based) she found on Google. I think this is the most likely vector, but she uses the same websites all the time.
    6) Visiting certain reputable, ad-free (AFAIK) sites.
    She is smart enough to never download/run/open suspicious programs/files/etc and she was using Firefox 3.5. This thing was able to prevent itself from being uninstalled easily. On Linux, she could have simply killed any offending processes (O.K. that's nontrivial, but no root permissions needed in theory) and check the (graphical, so-easy-to-use-a-caveman^H^Hgrandma-could-do-it) Gnome startup programs tool for suspicious entries. On Windows, we eventually had to use "System restore" (an OS feature) -- which the program could potentially have disabled had the malware author thought to do so (it was totally rooted -- the malware was preventing the installation of some anti-malware programs) and then download the anti-malware program that had previously failed to install. Windows Vista/7 are probably more secure than XP which she has, but I'm still reluctant to blame all Windows security issues on user stupidity. Now I have her running Firefox+NoScript so that it (hopefully) won't happen again, but that's mostly because she refuses to switch to Linux. Most users would be running IE7 or so... not Firefox+NoScript. This is clearly not just "user stupidity" -- it's a windows genuine advantage^H^Hbug.

  • by drsmithy ( 35869 ) <drsmithy@nOSPAm.gmail.com> on Wednesday December 09, 2009 @09:20PM (#30383792)

    The only cure is education.

    Wait, what ? Slashdot keeps telling me the user is not a factor in malware infections, how will "education" help ?

  • Re:Not more safe (Score:5, Interesting)

    by mjwx ( 966435 ) on Thursday December 10, 2009 @01:25AM (#30385204)

    Open source or not, you can't fix that unless the whole system is totally locked down like iPhone

    No, even the iphone has vulnerabilities. Locking down a system does not fix vulnerabilities, it only hides them from public view. An open system is more secure as everyone know when a vulnerability is discovered and syadmin's can make work arounds (or even pull the system down) until a patch is developed. With a closed system there is less chance of an exploited vulnerability being discovered by the people who want to fix it or are affected by it.

  • Re:Not more safe (Score:3, Interesting)

    by timeOday ( 582209 ) on Thursday December 10, 2009 @01:43AM (#30385270)
    The registry alone makes Windows impossible to clean. Who knows what is in there? It's a bunch of gibberish. Please nobody claim it's the same as /etc, because it isn't. At best the registry is /etc's evil twin.
  • Re:Not more safe (Score:3, Interesting)

    by Zardus ( 464755 ) <yans@yancomm.net> on Thursday December 10, 2009 @06:47AM (#30386440) Homepage Journal

    /etc might not be the same as the Windows registry (I agree with this statement, /etc is much more manageable), but the gconf registry is looking more and more like it every month. You can say gnome isn't an integral part of Linux, but it's installed on the majority of end-users systems nowadays so for these purposes, it pretty much is...

  • by oojah ( 113006 ) on Thursday December 10, 2009 @09:15AM (#30387134) Homepage

    I suspect the GP is talking about the interactive features of Zone Alarm. My understanding is that it only allows outgoing network traffic from known executables that the user has allowed. If an executable hasn't requested network access before, or if an executable that previously asked for access and was granted it but has now been modified (an upgrade/overwritten by malware/...) then Zone Alarm will ask the user again if network access should be granted. It also notes that the executable has previously asked for access and that the file has changed since the last access. L7 filtering is a good start, but it's the user interaction at the time of network access that makes Zone Alarm really useful.

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...