Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Linux IT

New Linux Crypto-miner Steals Your Root Password and Disables Your Antivirus (zdnet.com) 110

Malware targeting Linux users may not be as widespread as the strains targeting the Windows ecosystem, but Linux malware is becoming just as complex and multi-functional as time passes by. ZDNet reports: The latest example of this trend is a new trojan discovered this month by Russian antivirus maker Dr.Web. This new malware strain doesn't have a distinctive name, yet, being only tracked under its generic detection name of Linux.BtcMine.174. But despite the generic name, the trojan is a little bit more complex than most Linux malware, mainly because of the plethora of malicious features it includes. The trojan itself is a giant shell script of over 1,000 lines of code. This script is the first file executed on an infected Linux system. The first thing this script does is to find a folder on disk to which it has write permissions so it can copy itself and later use to download other modules. Once the trojan has a foothold on the system it uses one of two privilege escalation exploits CVE-2016-5195 (also known as Dirty COW) and CVE-2013-2094 to get root permissions and have full access to the OS.
This discussion has been archived. No new comments can be posted.

New Linux Crypto-miner Steals Your Root Password and Disables Your Antivirus

Comments Filter:
  • by SuperKendall ( 25149 ) on Saturday November 24, 2018 @03:38AM (#57691738)

    This new malware strain doesn't have a distinctive name, yet,

    How about:

    VeggieCow (roots!)
    AVTerminator
    NohupForAll (read the article)
    MinerMiner209-519er (perhaps too much a stretch).

    Actually you really should read through the article, more interesting than I thought it would be from the summary and this little bugger really does a number on a system.

  • by Anonymous Coward on Saturday November 24, 2018 @03:43AM (#57691750)

    that have long since been patched.

    update your damn systems, people.

    • by Anonymous Coward on Saturday November 24, 2018 @05:29AM (#57691926)

      Windows 10 is safer than Linux. It checks for updates every hour and installs them immediately. The user can't even disable that!

      • IOW, it is industry best practice to run the most up to date malware.
      • by Anonymous Coward

        Every present day Linux distribution automatically checks for updates. You then have to authorize installation. Alternatively, you can also switch to automatic update, which then runs while you are working not when you want to leave. BTW you can deactivate auto update in Windows 10.

        • by Anonymous Coward

          My Linux distro gives me a choice. I do manual updates.

          You cannot disable automatic updates in Windows 10 unless you totally disable the update software. That means every time you want to update, you have to reenable everything, let it update, then disable it all again. Also, you can't choose which updates you want. It's all or nothing.

          Windows 10 is the single worst operating system ever made by anyone in the entire history of computing.

          • Re: (Score:2, Informative)

            by Anonymous Coward

            MS does this because of all the bad press botnets have received over the years when people did not do updates on their systems.

            • MS appears not to care about bad press. The botnet stink gets replaced by the we'll force updates to 10 policy, we-control-your-W10-PC update policy, and the Windows as a recurring revenue service so we can push advertisements in programs forthcoming policy

              • by Anonymous Coward

                To defeat the botnet we must become the botnet.

      • Actually Windows will "say" it has checked for updates in the past day or so but 90% of the time if I press "Check for Updates", it finds one or more to download. I take care of a couple handfuls of Win10 Pro boxes and they all do this from time to time. Maybe it's for one of the less critical updates, but still. If you say there are no updates in the past day, don't start downloading updates that were released 2 weeks ago when I hit check for updates.

    • by sad_ ( 7868 )

      just what i though when reading this, but then i wondered that the actual target machines are probably IoT devices or consumer network stuff or maybe even old-ass Android phones still in use (wouldn't be that crazy). All those things run outdated, unpatched, insecure linux installations out of the box, with almost no chance of ever seeing an update.

    • some of the most exploited vulnerabilities have all been old. The reality is a vast number of home users AND sys admins don't adequately maintain systems.
    • Beat me to it:

      CVE-2016-5195 [redhat.com]
      CVE-2013-2094 [nist.gov]

      Seriously, this has nothing to do with "Linux is more secure than Windows". If you're running this old ass code in the wild, you sort of deserve it at this point.

  • by Selur ( 2745445 ) on Saturday November 24, 2018 @04:50AM (#57691864)

    Seeing the bitcoin prices falling and falling I wonder: "Why would malware creators still create such stuff, isn't there anything more profitable than this?"

    • If you just reap the fruit of another persons labor, it does not matter that you will be selling it below current market value - you are still making a profit.
    • by Anonymous Coward

      It is profitable if you don't have to pay for the electricity or hardware costs

    • Re: (Score:3, Interesting)

      by Anonymous Coward

      Seeing the bitcoin prices falling and falling I wonder: "Why would malware creators still create such stuff, isn't there anything more profitable than this?"

      Not really.

      Did you know that hacked Facebook accounts are worth more than credit card numbers?
      That is because Facebook accounts are less likely to be blocked out so they still have their value while credit cards typically are blocked by the time the buyer tries to use them.

      Essentially there aren't much you can get your hands on in an automated fashion that has value.
      Unless you resort to targeted attacks to get hold on specific information to sell to a specific buyer (Industrial or military espionage.) crypt

    • by AHuxley ( 892839 )
      No power cost, no cooling costs.
      Everything is done for free on another CPU using a free OS.
      The results are networked back for free.
      Would Linux users wonder why their CPU is in use more often?
      • by arth1 ( 260657 )

        Would Linux users wonder why their CPU is in use more often?

        Possibly. Add a comma, and I'd say certainly: Linux users would wonder why their CPU is in use, more often.
        This is due to all the commonly used standard tools that would give an indication, including but not limited to w, uptime, top and ps.

  • by Shinobi ( 19308 ) on Saturday November 24, 2018 @04:59AM (#57691878)

    This is an example of why local privilege escalations should never be scoffed at. You can blather all you want about permissions etc, but only one slip is required, and you're shit out of luck

    The sad thing is that I've had to argue this point for 20 years now

    • by Anonymous Coward

      They do matter, but you still have to get a way in.

      You still have get the user to somehow run this script. Considering that scripts aren't even executables as such to begin with, and the considerably better average computer literacy among Linux users, this doesn't sound like too much of a threat. This doesn't preclude that some "user-friendly" [techrepublic.com] applications muck things up, ofc. Stupid will always find a way, no matter what you do, but that's no different from things have always been.

      • "and the considerably better average computer literacy among Linux users, this doesn't sound like too much of a threat."

        I don't agree. There is a growing base of Linux users who do not know what's going on and living in some grand illusion that they're safe because it's Linux. I've ran into facilities who are running their own Linux servers with no IT specialists, giving root access to plant managers who don't know what they're doing because that's what their "Enterprise" software devs encourage because t

        • by ahodgson ( 74077 )

          Based on the attacks I see daily most exploited Linux machines seem to be at self-hosted VPS outfits like OVH and Linode.

      • by Shinobi ( 19308 )

        You forget the people who install a user friendly distro on the advice of their supposedly tech competent friends or relatives, or have had Linux installed by them. The same people who then come and say "I've given them a default setup, and I no longer get any virus calls, because they have Linux now", in a very arrogant manner.

        And even competent people make mistakes in configuration.

  • Scaremongering much? (Score:5, Interesting)

    by Anonymous Coward on Saturday November 24, 2018 @06:00AM (#57691958)

    Not one shred of information on /how/ the script got on the system in the first place

    I'm calling bullshit on the article.

    With such a critical piece of information missing, it's clearly scaremongering and pretty close to fake news.

    • Because the article describes writing to a "folder" and disabling antivirus, it's clear it's not about exploiting a regular distro. My guess is that it's WSL-only, requiring an usual Windows security hole of the hour as the initial vector.

      • Nope. It works on standard linux systems relying on two long fixed root exploits.
        • by Anonymous Coward

          I am still missing the crucial piece of information: how does the script get executed in the first place? Do we assume that the user is silly enough to run random script s/he downloaded?

          • The malware has the functionality to hijack ssh connections to other systems and execute itself remotely.
            • by PPH ( 736903 )

              I get damned suspicious whenever something prompts me for a password on another machine. I don't share authorization keys (allowing password prompt bypass) between any machines other then a few of my own. And the effort needed to infect any of those is equivalent to that needed to infect my local machine.

            • by arth1 ( 260657 )

              The malware has the functionality to hijack ssh connections to other systems and execute itself remotely.

              So you have to have a system that already allows remote root access from other insecure systems, AND someone who invokes that ssh connection from an infected system? That doesn't sound like it will hit very many...

    • by Gavagai80 ( 1275204 ) on Saturday November 24, 2018 @08:42AM (#57692198) Homepage

      Every Linux "virus" article I've seen, and there've been a lot of them, has turned out to be about a trojan. Apparently people can't tell the difference anymore. It's a safe bet that this gets on your system by your choosing to download and install a random piece of software you have no reason to trust, instead of sticking to your repositories.

    • by jmccue ( 834797 )

      If I had mod points I would waste them on the AC. That is my big question, how did it get there in the first place ?

      [ ] running a bitcoin miner

      [ ] Windows subsystem for Linux

      [ ] someone downloaded it and said "what the hell, lets go for it"

      [ ] magic

      If via Windows then that is interesting, now some Linuxes will get to enjoy the fun and excitement Windows brings us

    • Not one shred of information on /how/ the script got on the system in the first place

      I'm calling bullshit on the article.

      With such a critical piece of information missing, it's clearly scaremongering and pretty close to fake news.

      A link in TFA leads to the "cure"... Surprise! It's a recommendation to run the antivirus maker's antivirus software!

    • Not one shred of information on /how/ the script got on the system in the first place

      Someone downloaded it and executed it. This is has been how all of these scripts on all operating systems work. Only Apple can fix this. It's time to take away sudo rights from Linux users.

  • Most Unix like systems are happy without a "root" user as long as there is a user 0 called something.

    I still don't agree with the POSIX standard that allows root to write to mode 000 files. If its 000, it was done for a reason and that means even root shouldn't be able to screw with it particularly if it is root:root mode 000.

    • Then how would you grant permissions back to the file if you can't use root to do it?

      • How would you access the file, without modifying the file, for backup operations of a read-only filesystem? This happens enough that I cannot see supporting the change.

    • "I still don't agree with the POSIX standard that allows root to write to mode 000 files."

      I probably agree with your rationale. The semantics of 000 are fairly clear, so it seems there's no reason to "overwrite" them just because (specially when a root user could easily change back the file's permissions before editing it).

      But then, there is chattr (or chflags) to deal with that case. I think they are no POSIX-compliant, though.

    • by AJWM ( 19027 )

      This is probably a stupid question because I haven't finished my first cup of coffee yet, but why would you want a 000 file? That's just an inode and a chunk of disk space that can't be used for anything.

      Oh. It still has attributes. It can be used for something.
      Never mind.

      • This is probably a stupid question because I haven't finished my first cup of coffee yet, but why would you want a 000 file? That's just an inode and a chunk of disk space that can't be used for anything.

        Oh. It still has attributes. It can be used for something.
        Never mind.

        ---------- 1 root root 0 Oct 15 22:07 this_file_is_inaccessible_but_its_name_means_something

        Yeah, it's stupid. But it's not entirely useless.

  • No antivirus and no root password. I have one machine that's pretty much always idle and another that's a laptop. I would notice the fans kick on if either of those started mining.

    I think I'm good.

  • "Once the trojan has a foothold on the system it uses one of two privilege escalation exploits CVE-2016-5195 (also known as Dirty COW) and CVE-2013-2094 to get root permissions and have full access to the OS."
    Is this really malware that is targeting systems that haven't been patched in two years?
    • Still relevant. A lot of nix systems out there that's unpatched for years on. You can say they deserve it, but there are reasons for them being unpatched. A lot of them stupid reasons because the enterprise system they're using discourages updates because it breaks their stuff. I see this crap everywhere.
  • A good precedent is the Morris Worm, the first major worm attack against UNIX systems. Published on Nov. 2, 1988, the worm used known vulnerabilities in popular UNIX tools such as sendmail, and also cracked weak passwords. Defenders effectively _broke_ the early Internet to contain the Morris Worm and while they frantically applied patches they'd considered risks to production systems before that day. Its author was eventually convicted, but Robert Tappan Morris had the best "get out of jail free" card on

  • Remember back when companies in the early 2000s would brag that their software was over a million lines of code, as a testament to some sort of level of complexity? Apparently that threshold has been pushed all the way back to only 1000 lines of code. Honestly, I blame all these copy-paste script kiddies who have never actually written code for thinking that a 1000 line program is "complex" or "large" by any stretch of the imagination.

  • Bring them all on. Linux is rock solid and all I got to say is bring them all on.

  • Having to run unsigned binary executables isn't exactly linux but a bastardisation huh? It's common now. Run as root too

  • Since when Linux systems have antivirus as a norm? You could scan some unnecessary executable downloads, but that's it. There is no need for permanent resource hog sitting, eating and making you smile by a security illusion. When some bad code has run, the system has to be reinstalled fully. It's already dead inside. So when you install some unknown code, you could as well do that. The greatest security threat is still the promiscuous user.

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...