

Looking At The New Linux Trojan 263
Da Schmiz writes: "Security firm Qualys discovered a new Linux trojan on Saturday ... details can be found on their website.. Vnunet picked up the story earlier today, and then followed up with more details. They're comparing the potential impact to Code Red or worse, since more servers run Linux / Apache than NT / IIS. I don't think it's that bad, since the infection can be easily detected, but it certainly isn't good." Update: 09/08 11:58 AM GMT by H : Of course, as Kurt Siefried pointed out in e-mail: "The trojan has nothing to do with Apache. The virus attaches itself to an
executable, which you must run to infect other binaries (i.e. you must run
this as root). This means that infection vectors include, but are not
limited to email attachments, but you must of course save the binary, then
set it executable, and then run it, as root, to do any real damage.
Alternatively you must download binary software and run it (again as root to
do any real damage). In other words someone must run binaries of unknown
origin as root, and if this is common practice then you have larger policy
and education problems to deal with." So - comparing it to Code Red is a bit dubious.
Technical detail: (Score:4, Informative)
Unless it also reconfigures my firewall to allow incoming traffic to port 5503 and higher and fiddles with my hosts.allow file, I'm not particularly concerned. Anyone who fails to have more than one layer of precaution on their system has a bit more to worry about.
Partial isinformation (Score:5, Informative)
Whoa, cowboy!
However, your advice to use kernel firewalling is sound. 'Defense in depth' is the only way to go.
Re:Technical detail: (Score:2, Interesting)
Re:Technical detail: (Score:2, Insightful)
I bet that if crackers do start scanning Linux boxes for this trojan, ports like 7777-7778 (UT) and 27015-27106 (QIII) will be primary targets.
Re:Technical detail: (Score:3, Insightful)
Except if it's a home machine with no personal/financial information on it, is connected to a cable line that can't do any damage sending data up its 128K upstream, and is running a few rudimentary firewall, you don't have much to worry about. Some people take their security WAY too seriously.
This will be interesting.. (Score:2, Insightful)
Re:This will be interesting.. (Score:1)
Re:This will be interesting.. (Score:1)
enough to run binary attachments, presumably
they would have to be reading their mail
as "root" to infect appropriate files.
i certainly dont read my email as root.
Re:This will be interesting.. (Score:2)
1) Why use Mac OS X as root? It sets you up as Administrator (less than root) and allows you to create lesser user accounts.
2) My Mac OS X box talks to my cable modem just fine, and did so at installation time when I told it I would like to connect to the internet.
So either you're a super-troll and I've just fed you, or you're smart enough to get root on OS X (no easy task) but dumb enough to not get the cable modem up and running with one click.
Re:This will be interesting.. (Score:2)
Sorry I insulted you. Can't you set those apps to run be run by a lesser user?
Or, can't you set them to start as root? What are these apps that you have to be root for?
What machine are you running on that doesn't like the installation assistant?
I tell it I have DHCP for my IP address, and I don't give it any more information than that. I unplug my cable modem (moto surfboard, if it matters) and let it sit for a minute to clear any IP leases it has from Roadrunner. (unplug-replug won't do it, it grabs the same IP and doesn't reassign to the computer.)
I plug in the cable modem, let it do it's flashing light dance, reboot Mac OS X to rehup networking (not an niutil guru yet.)
And it all works.
lvmarks@mac.com
Re:This will be interesting.. (Score:2)
Code Red required no action on the part of the user/administrator other than having an unpatched system. This requires someone to be careless.
This is further mitigated by the fact that, likely, the majority of infected machines won't be infected with full root access, rather it would be some random unpriveleged user who infected the machine.
And even further, compare a typical Linux administrator to a typical NT administrator. 'nuff said. We patch our boxes, read security bulletins, run firewalls, and don't run random attachments.
Re:This will be interesting.. (Score:2, Interesting)
The article even mentioned (more than once) Apache and how many servers on the net run it.
So what? Unless I missed a paragraph, Apache has nothing to do with it!
Re:This will be interesting.. (Score:2)
I'm just waiting... (Score:2)
links (Score:2)
Description here: http://www.tuxedo.org/jargon/jargon.html#back door
BTW, why is slashcode telling me I've violated the postercomment compression filter when I attempt links?
Is it really that bad? (Score:1)
Ok, does anyone remember Back Orfice as being a major threat to the Windows operating system world? The only people that have the potential to be infected by this new virus are those that are dumb enough to run the program. If you get an email from someone, and there is an attached program to it, most people wouldn't run it. I don't think that this virus has any potential to be a threat because Linux users are generally smart enough to not run every program that they get sent to them.
Re:Is it really that bad? (Score:1)
Well if you're aiming at getting linux to the desktops then you're clearly aiming to get a good userbase of such "dumb" people. Those who come from a M$ background might be used to running email attachments (probably even cribbing on why can't it run automatically) So such trojans can cause a havoc and scare away such users.
Re:Is it really that bad? (Score:1)
It's an email virus! (Score:2, Redundant)
Re:It's an email virus! (Score:1)
Re:It's an email virus! (Score:2, Insightful)
The same is true in operating systems. Just because it is easy doesn't make it good.
Re:It's an email virus! (Score:1)
The parent article was probably poorly worded, but I don't think that was what the author meant. I think the message to be conveyed was that the vast majority of less capable computer users have chosen to use the Windows platform, at least partly because they don't know any other choices exist.
The majority of the Linux admins do it either because Linux == Free Beer or because "they think it's cool to run a server"
Actually, I don't consider those who run a Linux server just because they think it's cool to be an admin. I used to run a Linux server just for tinkering and I surely didn't consider myself an admin.
So, if you lay aside that group, you'll probably be suprised to see that a large portion of the real Linux admins out there run that OS for three reasons: 1. They don't want to have to frequently reboot an NT server, 2. They can run a whole bunch of Linux servers from a single distribution copy, and 3. They can get more reasonable performance using Linux on older or cheaper hardware.
Doesn't seem like a big deal (Score:1)
Ulterior Motives at vnunet? (Score:1, Interesting)
Needless to say; not trusting the source, I skipped that particular article.
Has anyone else had that happen with that site and that story?
What file did they find did this trojan infect? (Score:5, Interesting)
This is no way as bad as Code Red, Code red self replicated on unpatched servers. This trojan will not replicate without a user doing it. Sheesh, bad journalism.
Re:What file did they find did this trojan infect? (Score:1)
Oh yeah? What about a (for example) debian admin who does "apt-get update" or whatever and theoretically has a trojan "ls" installed as an update.
Re:What file did they find did this trojan infect? (Score:2, Informative)
that would be like installing a patch from microsoft that was infected with a virus.
most people have to trust someone and for those who dont there is always the sourcecode.
Mirrors are probably more vulnerable, though. (Score:2)
I guess these are the chances we take in binary upgrades, but I'm not sure that source would be much more safe, at least for those of us who don't personaly audit every single source update we do (I know I don't have the time).
a similar story in history (Score:5, Funny)
Re:a similar story in history (Score:3, Funny)
Re:a similar story in history Version 1.1a (Score:2)
Dwonis ducks and takes cover.
I just wanted to point out (Score:1, Redundant)
The real problem is stupid sysadmins, how many servers (or computers in general) out there are susceptible to exploits that are years old..
Damn, some skript kiddie tried to hack my box but had the netbus server running on his box. It was kinda amusing for a while there..
Not a big deal.. but then... (Score:1)
But this could be a big issue when linux is used in offices (where the "dumb" people work) not everyone is a *nix guru.
Re:Not a big deal.. but then... (Score:2)
I was going to post something to the same effect. Thanks for beating me to it.
Re:Not a big deal.. but then... (Score:2)
Quoth chmod(1):
And, yes, vulnerable setuid executables can be run by local users to compromise the system in such that unauthorized remote administration is possible. This can happen either through the user's evil intentions or by a trojan.
That's why it's necessary to patch locally exploitable programs, and good security practice to unsetuid things that don't need to be setuid (eg., the 'mount' executable on a system such as you described has no business being setuid)
Also, firewalls that only allow connections to be initiated to needed services can be of assistance. Apparently such a firewall would help in this case, but an attacker can set up a remotely intiated proxy or kill off the real daemon that's supposed to be running and replace it with a 'custom' version.
Re:Not a big deal.. but then... (Score:2)
However, last time I looked, the user requires root privileges to make the file setuid root. And you can't copy setuid root files from one place to another as a non-priveleged user whilst retaining the setuid bit.
So no, this bit is not a concern when combined with trojans, given reasonably normal security practices.
Re:Not a big deal.. but then... (Score:2)
Eg., if the machine is a webserver which will never be connected to a printer, you can get rid of lp, lpr and friends.
If you don't know what a program does, check the manpage. If it doesn't have one, try a websearch or unsetuiding it to see what breaks. (In my experience BSD has the best manpage availability and quality - eg., even each kernel driver has its own manpage.)
Cute kittens (Score:3, Insightful)
Re:Cute kittens (Score:2)
People running around as root are probably not going to get an email attachment, change it to a binary and run it... I would wonder if they would even know how to do that.
The other point is that most of the Linux community is well informed. It would be a lot less of a problem b/c we know what the hell is going on. If you see something odd happening you would immediately fix it.
Knowing what port is runs on, etc is all helpful information that will stop most of the attacks from happening.
Re:Cute kittens (Score:3)
Whatever! (Score:3, Interesting)
In other words this trojan is likely to affect the vast hordes of Linux users that always log in as root, use their Linux box to read email, and who automatically install and run binaries that the receive off the Internet.
All five of them.
Seriously speaking, this is one of those areas where Windows users see how easy it is to use email to trick Windows users into triggering trojans and they figure that Linux must be similarly vulnerable. It isn't.
First of all, most Linux users, even new Linux users, don't do much of their work logged in as root. In Linux it is trivial to use su or sudo to become root as necessary, and this particularly trick is one of the first that most Linuxers learn. Second of all, Linux does not make it easy to run foreign executables. No Linux client I can think of allows you to simply click on an attachment and automatically run it. Besides that, even if the person does run the executable how does it spread. Windows email viruses rely on the fact that they can programatically access the Outlook address book. Even Windows users who use Eudora or Netscape Messenger are immune to this trick. Under Linux the question of how the trojan is going to email itself to my friends is even more difficult. There are literally hundreds of mail clients that see active use. Your trojan would need to parse many different kinds of text based address books (heck, there are probably three different Emacs packages that one could use as an address book).
And when all was said and done the chance of this trojan spreading are nearly nil. After all, even if one Linux user got infected, and the trojan successfully mailed itself to 200 of his closest friends chances are good that very few of these friends would be running Linux, and chances are even better that none of those friends running Linux would be similarly vulnerable (or nearly as dense). The trojan would refuse to spread, and that would be the end of it.
Comparing this trojan to the Code Red worm is laughable.
Hah (Score:1)
Ya think?!?
This explains a lot... (Score:5, Funny)
The Worst Thing Of All (Score:2, Funny)
At this time, the Remote Shell Trojan source code is not known to be available.
This...thing violates the GPL and everything Open Source stands for! They could sell it commercially, and not even contribute back to the code base! That's just so, so, so non-Stallman that it makes my middle finger itch!
Does it self-compile? (Score:1)
So this thing infects Linux running on a specific platform, and only when the victim decides to run a strange, unknown binary attached to an email.
Next.
Don't worry, this is no Linux Code Red (Score:5, Informative)
Code Red required no user activity at all. A typical orphaned Linux box standing around in a corner would not be at risk, the same machine running IIS would have been a sitting duck for CR. There are a lot of orphaned servers out there with standard Redhat or IIS installs. These are the real danger. Any remote-root security holes on these popuplations are cause for real concern.
I don't know if I'm typical or not, but where I work, Linux is used on servers (yup, I'm responsible for that) but we hardly ever read our mail on a Linux box. We use a Windows platform for that. So -> no risk.
I'm thinking a Linux desktop user would be a better victim for this. Fortunately, hardly anyone uses Linux on the desktop so we're all safe!
Regards,
Xenna
Re:Don't worry, this is no Linux Code Red (Score:1)
The next remote hole that pops up can be combined with this technique to produce an interesting effect.
1. cause remote hole
2. infect with "worm/backdoor/trojan/whatever"
3. rinse repeat
Re:Don't worry, this is no Linux Code Red (Score:2)
They'd also need to be running as root.
Re:Don't worry, this is no Linux Code Red (Score:2)
When they are actually on campus, they have a choice of eudora, simeon (I think), elm (ssh/telnet into an irix server), or webmail.
Why use outlook?
(* the majority of Exeter, UK's comp sci students dont know a mouse from a monitor either!)
This is nowhere near the level of Code Red (Score:1)
This trojan needs users to individually execute it, AND those users need privileged permissions for it to have a major effect. This will not result in the massive waves of infection that we saw with Code Red.
Hell, all linux needs now is to make friendly software that installs this easily
Re:This is nowhere near the level of Code Red (Score:1)
Show us the actual thing (Score:1)
Most important though, they do not show an actual binary which allows me to verify their claims. The only thing they give me is a detection program, I would check THAT for trojan code if I were you! Actually the detection and cleaner program come in source code, and appear to be what they claim to be after a quick glance.
Re:Show us the actual thing (Score:2)
A few years ago I was perusing the virus database of a large anti-virus company. They categorised virii in various ways, and one of the attributes was where it had been found. The majority were 'laboratory only'.
Now, what does that mean? If it's only been found in the 'laboratory', then it must have been created there.
I'd be delighted if someone who knows can enlighten me as to what 'laboratory only' really means.
Re:Show us the actual thing (Score:2)
I dont get this ... (Score:1)
"Qualys also warned that the size and scope of the Trojan could be massive. Over 58 per cent of websites worldwide currently use Apache servers for which Linux is the most popular platform"
Any sysadmin opening a bin on an production webserver deserves all he gets.
Plus the fact that most FW/routers will block the incoming udp connection makes even an infected box "safe"
Trojan 101 (Score:2)
doTrojan();
doMainApp();
}
There, I just wrote myself a new "Linux Trojan". The thing is, a "New Trojan" is actually nothing new at all. Basically, all you need is a bit of code that seems userful to the user, a bit of code that the user never gets to see, and a user to run it. I can write a perl script that will happy crank out "New" trojans by the trillions. Disk space is the pure limit to the number of perfectly unique "Linux Trojans" I can make.
I know a lot of people will use FUD like this to point out that Linux has it's flaws too, but that is complete garbage. A trojan is not a threat to a competent user on a machine with even the barest levels of user authentication and security. It is only a threat to the naive or the foolish.
Re:Trojan 101 (Score:1)
int main() {
return doStuff();
}
Can't even see it
Re:Trojan 101 (Score:2)
main() RETURNS INT!!!
Stop reading Schildt.
Now write both of the following declarations out 100 times each.
int main(void);
int main(int argc, char ** argv);
:-)
Re:Trojan 101 (Score:2)
Unless the Linux user has done a chmod -R 777 / recently, the windows user is going to be in serious trouble while the Linux user is fine. Why is that? Because Microsoft has some serious mental problems when it comes to security in thier non-NT environments.
A trojan is not news. Horribly gaping flaws in security models may be, but the trojan itself is one out of a hundred trillion million trojans just like it.
Re:Trojan 101 (Score:2, Insightful)
I know a lot of Linux users who always use the root account.
Re:Trojan 101 (Score:2)
Now for the obligatory aergument by analogy:
The Linux filesystem and user permision are like a government. What they set up is a something akin to a "legal system" in the computer. Sure, malicious programs can try subvert that (which this program TRIES TO BE, BUT IS NOT SUBTLE ENOUGH). When such a rogue program is detected, this system can help you to diagnose programs, isolate the infected binaries and "jail" them. In Windows 9x, there is no government, there is only chaos.
Give me a break... (Score:3, Interesting)
This really is a non-story. Anyone that has the skill to install Linux would know better than to execute this sort of attachment.
Offtopic: We need a Slashdot Virus Pool for the first distributed threat to Apple's Mac OS X. I am guessing May 16, 2006.
Re:Give me a break... (Score:1)
Tried there tool... (Score:1)
Well it would not run, as it said that this exploit does not work with IP addresses with 0 in it, weird.
Plus you need permission to write to the
Just seems a spin to "ready" the Linux market for their anti-virus ware IMHO.
StarTux
Blame it on the rain (Score:1)
I say, find the author and prosecute him.
Not an Apache worm (Score:2)
Contrarily to what the summary hints at through the mention of Code Red, and Apache, this is not an Apache worm. It's a trojan that you actually have to execute yourself in order to be infected. Thus, if you don't blindly execute e-mail attachments, and download programs from untrusted sources, you should be safe. Moreover, the trojan is rather primitive and doesn't try to manipulate the file modification dates to hide its presence. Thus a simple ls -ltrc
Sensational bollocks (Score:1)
Nothing but sensational trash. It is nothing like Code Red. I'm not an expert, but from the shabby detail in the article I can see several reasons:
They shouldn't compare it to Code Red. CR was a disaster because a company called Microsoft encouraged people to install trash software that shouldn't have passed QA.
They should instead compare it to, say, an Outlook virus because it spreads via email:
Have a read of Michael Parenti's Monopoly Media Manipulation [michaelparenti.org] and see how many of the points you can spot in press release.
A lot of sensational bollocks.
These journalists must be desperate for attention. (Score:5, Insightful)
As virii go, this is pretty pathetic, and prompts one to question the competence of anyone who thinks it is significant. The email-vector mechanism can't even take advantage of address books, since Unix mail clients are so far from standardized.
Virii threats (Score:2)
Careful. Sometimes its the simple ones that are most effecive.
---
Hi! I'm a sig virus! Please copy and paste me to your signature file so that I may propagate!
Re:Virii threats (Score:2)
No, this trojan is literally pathetic. Basically if you run it as root it would wreck your day. Big whoop, who runs foreign executables as root?
In other words this trojan is no more dangerous than the following two line super sh trojan.
#!/bin/sh
/bin/rm -r /*
I could send that out in a million emails with the subject line of "Click here for a good time." and no one would end up with an erased hard drive.
Now, it certainly is possible that this trojan could be combined in a very deadly fashion with the next Linux remote root exploit. But what's the point. Why in the world would you need a fancy back door tool to remotely control a Linux box? It would be easier just to install a hacked version of the sshd daemon that didn't ask for a password for user "m@ster". Once you've got root on a Linux box there's plenty of remote admin tools already installed.
Re:Virii threats (Score:2)
Granted - the whole situation is a bit of a joke.
I don't have much faith in the analysis (Score:3, Informative)
Wait, so it listens on a UDP port, but it can be compromised using TCP? Do the people that analysed this actually bother proof-reading, or do they simply not understand what they write??
It's a Virus not a Worm. (Score:3, Insightful)
Why on earth do people think that this code can infect machines remotely over the Internet ? Does it say so anywhere in the article ?? No !!
From the article:
The so-called Remote Shell Trojan spreads through email as well as replicating itself across the infected system.
It's simply a trojan that you will have to get in mail or on a floppy and execute YOURSELF.
Then it will infect other executables on your system, but in no case will it be able to infect any other systems without human assistance (i.e. executing a binary on that computer).
Whoever thought this is even remotely as scary as Code-Red is in need of some serious medication.
A new one has been found! (Score:5, Funny)
FOR IMMEDIATE RELEASE
Overview
The Really Silly Command Virus identified by Blackant Systems has the potential to remove all files from a hard drive. It was recently spotted in the wild a few days ago when a junior sysadmin logged in as root on a production server and executed a shell script he had been emailed from a user known only as script_kiddie@hotmail.com.
Impact
Given a detailed analysis of the source code behind this virus, it is possible that the Really Silly Command Virus may eventually mutate into a self-propagating worm.
Recomendations
Blackant Systems reccomends that every sysadmin who would run shell scripts from untrusted parties be shot.
In order to determine if your email may contain this new virus, please look for the following first few lines in a shell script:
#!/bin/sh
#1337 script by script_kiddie!!!
#props to all my homies!!!!
rm -rf /
#this doenst seem to work yet...
mail $0 $1
If you find a file with similar lines, do not execute it on your server, but remove it immediately. Blackant Systems will be releasing a utility to identify stupid sysadmins shortly.
What counts (Score:4, Funny)
I'm sorry but i felt it had to be said even if I loose karma
His arm has grown long indeed.... (Score:3, Flamebait)
This "alert" is clearly bought and paid for by MS. The idea that a machine running Apache is "vunerable" to a trojan that depends on a superuser saving and running an email attachment of unkown origin (or a normal user somehow setting the suid bit on the attachment) is so stupid that it can't be stupid: it must originate with someone that has a vested interest in spreading FUD.
Let's see now, who do we know that doesn't like Linux, is having a major launch of a new version of their OS and is known for sponsoring "research" that shows that Linux is the tool of the Devil? Hmm.... Is it Bill, the mild mannered janitor? Could be, could be!
TWW
Consipiracy theory ... NOT (Score:2, Insightful)
Who ever wrote this article is just plain silly!
Re:Consipiracy theory ... NOT (Score:2)
plus, M$ has a track record of this sort of thing.
TWW
Re:His arm has grown long indeed.... (Score:2)
The idea that a machine running Apache is "vunerable" to a trojan that depends on a superuser saving and running an email attachment of unkown origin
Indeed. Ironic, isn't it, that this is essentially what the majority of Outlook users do when funky stuff appears in their e-mail boxes.
Interesting how the author of this warning is attributing the same level of intelligence to Apache sysadmins as one attributes to a donut-eating secretary who festoons her machine with screen-mates and horsehead screensavers.
I noticed also that the first pop-up ad which hit me after I opened the article at vnunet.com was for Microsoft's Enterprise Server software. And Vnunet's logo has the same font and feel as the top of a page at microsoft.com.
This feels like a M$ publicity stunt. It's time to shut the bastards down somehow.
The New Linux Trojan! (Score:5, Funny)
Cindy: Oh Harry, You're so smart! It really turns me on!
Harry: Oh wow!
Cindy: As soon as you finish that, I'll think up something to allow us to Celebrate!
Harry: Oh, WOW!!!
<horse braying>
Singers: "TROJAN MAN!!!"
Trojan Man: Looks like you two are planning to... exchange private keys?
Harry & Cindy: Well... Uh... I don't...
Trojan Man: Try new Linux Trojans! The Condom for the virus conscious!
Harry & Cindy: Thanks Trojan Man!
Trojan Man: My job is done here!
<horse braying>
Trojan Man: Yes, we'll find a philly for you some day...
Hey, geeks can dream, can't they?
OK, let me get this straight (Score:2)
2) You have to download, chmod +x and run a binary program from an email, presumably one that doesn't come from someone you know
3) You have to be stupid enough not to notice that
...
Can anyone say "stupid man's trojan"?
Re:OK, let me get this straight (Score:2)
Has anyone even seen an attempted attack? (Score:2, Interesting)
As has been repeatedly pointed out, it would take a complete idiot to save an unknown binary file, chmod it, and run it as root. But you would have to *get* the binary before you could do that. Most of the talk about Linux virii and trojans is very hypothetical. Independent of all the theoretical reasons why they don't occur widely on Linux there is the empirical fact that there has never been anything affecting the same percentage of Linux systems that Cod Red or Sircam did for MS products.
This case seems no different. All the hype is little more than a scam by an anti-virus software company.
Blah Blah (Score:2)
Comparing a few newbies potentially being stupid enough to run an executable recieved in E-Mail as root to Code Red is quite a stretch.
Impact on Linux (Score:4, Insightful)
If the popular media picks up a story that "LINUX USERS FACE DEADLY TROJAN (film at 11)", it will help create a perception of vulnerability, and its a small step to go to "and since Linux is freely distributed, who knows what can lurk in that copy you download..." While techies familar with Linux will have a reasonable grasp of the true threat and how to overcome it, what about the deciosn makers who are deciding what to implement at their companies? The ones that set budgets and decide what IT will implement (and IT may not have much of a say in the decision) will remmebr "Linux - oh yeh, that's the system that got hit with that DEADLY TROJAN."
Not enough details... (Score:2, Troll)
I have tried many of the linux email programs at one time or another--pine, elm, mutt, postilion, balsa, tk-rat, kmail, evolution and sundry others to numerous to recount. And lets face it people, for proper email viruses you need an advanced Microsoft email client. Outlook is a good example.
First there is the problem of automatic or almost automatic execution. Linux email clients have not yet achieved the same optomistic attitude towards code in email attachments as Outlook. However, anyone who has used Linux is already familiar with this and I do not need to elaborate.
Then, because Linux lacks any sort of standards (http://microsoft.com for more information), there is no easy way to send emails out to everyone on the persons list. The easiest thing would be to use perl. But even this is poses problems and the Qualys guys don't mention anything about perl or how it sends the emails out.
Personally, I really doubt Qualys knows what it's talking about. Look at how many times [google.com] Qualys has been talked about in the context of linux. Compare that to a reputable Linux endeavor. [google.com]
And also... Any security company should know that the only way to clean an infected computer is to reinstall. Installing more close source software on top of the close source virus seems like a silly thing to me.
(Not that I think Qualys would deliberately do something wrong but they don't seem competent enough to analyse this virus thouroughly or program a bug free fix).
Non-issue (Score:2, Insightful)
This is no more an issue than the is the "threat" of linux-based viruses. C'mon. Only a complete IDIOT would would "infect" his system with this sort of virus/trojan.
Linux COULD be affected by a virus IF root ran a virus-infected app or if one of the linux office suites develops a hole-laden macro system ala Word - IF that macro was run as root.
This is no threat or problem to any linux system except those few morons who do everything as root and would actually download and run an unknown application off the net as root.
This is a sham. This is FUD. This is either an M$-supported FUD or an attempt by some bozo to get web hits and, as another poster mentioned, harvest email address. Hello spam!
It's almost fun (Score:3, Funny)
Anyway, it will be fun to see if the crap media picks this one up "uh no! a worm on Linux, we always knew it would happen! we haven't seen it yet, but someone mentioned it may get worse than CodeRed!"
But I'm really happy
Wait a second... (Score:2, Interesting)
(In all fairness to them, they do provide source alongside the pre-compiled binaries, so the security-conscious can audit the code and recompile.)
This reminds me a lot of a rant [linuxmafia.com] or two [linuxmafia.com] by Rick Moen [linuxmafia.com] of SVLUG [svlug.org] fame. The main problem is sysadmin inexperience. Granted, you can still trash your own files (and lose all your user data), but the system will be safe. So just run untrusted executables as a different, non-privileged user, if you must run them at all.
hmm run as root??? (Score:2)
This is different than just say opening your mail program and going to the inbox and reading a mail that wipes your hard drive like the "I Love You" Windows virus did.
Or better yet the code red which atacket web servers by causing a buffer overrun.
Yeah thats that same thing. And I'm Joe isuzu
Easily detectable? (Score:2)
Uh, if I remember correctly, all you had to do to find out if you had the Code Red worm was look for a text file in the root of your machine. That, and there was an executable for people too brainless to do so. How was Code Red not "easily detectable"?
I politely disagree. (Score:2)
I politely disagree.
With the spread of easy-to-install Linux systems, people with relatively little technical knowledge have installed Linux. These people are the ones most likely to fall for the trojan.
The only question... how could they get a list of newbies?
Re:I politely disagree. (Score:2)
It is easy for a newbie to install Linux. Using a Linux box as your email client requires about 20x times more savvy.
Not to mention this virus requires active participation to spread, while Code Red did not.
This is not a threat.
man, if i had moderator points (Score:2)
Re:Not that bad? (Score:1)
Personally I don't quite understand what the big deal is.
Re:Not that bad? (Score:1)
Re:bout frigging time (Score:2)
Re:The Jury Is Still Out (Score:2)
I think it'd be a perfect opportunity to show off Linux's advantages, though. Sure you can get infected by this. But most Linux users don't routinely run as root, Linux provides a nice firewall system and you need root privileges to alter that firewall. So even if someone's infected, if they've blocked UDP port 5503 ( and maybe higher ports, wherever the Trojan will listen ) with the firewall then even if they're infected the Trojan can't be contacted and exploited and a simple script can be put into crontab to check for a) the listening connection, b) the lockfile and c) the rejected incoming attempts and alert the user. It'd take me maybe an afternoon to come up with the scripts that'd run on any Linux system.
So let them hype this one up, then demonstrate the 2 minutes' work it takes to immunize your system against it if you're dumb enough to run unknown software manually, and then note that you aren't that dumb in the first place.
Someone Is Shitting Someone (Score:2)
I ran across this a couple days ago and it looks like a publicity stunt for Qualysis to get some attention. Here's a Deja discussion [google.com] that sheds a little more light on it.
In all my years using Linux/AIX/Unix I can't recall ever receiving an e-mail/web/ftp download that chmod +x's itself on the client. Unless of course you're overwriting a file +x-ed with that name. Good thing I don't have any scripts named "R00tMePlz.sh" laying around.
Re:it's not so autoreplicant... (Score:2)
This is dangerous:
# mv binary_attach
Please:
$sudo rm binary_attach
would be preferable. Some recent RH converts still don't know what a device file is...