Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft Security Linux

Microsoft Warns of 'Stealthy DDoS Malware' Targeting Linux Devices (zdnet.com) 76

"In the last six months, we observed a 254% increase in activity from a Linux trojan called XorDdos," writes the Microsoft 365 Defender Research Team. It's a trojan combining denial-of-service functionality with XOR-based encryption for communication.

Microsoft calls it part of "the trend of malware increasingly targeting Linux-based operating systems, which are commonly deployed on cloud infrastructures and Internet of Things devices." And ZDNet describes the trojan "one of the most active Linux-based malware families of 2021, according to Crowdstrike." XorDdos conducts automated password-guessing attacks across thousands of Linux servers to find matching admin credentials used on Secure Shell (SSH) servers... Once credentials are gained, the botnet uses root privileges to install itself on a Linux device and uses XOR-based encryption to communicate with the attacker's command and control infrastructure.

While DDoS attacks are a serious threat to system availability and are growing in size each year, Microsoft is worried about other capabilities of these botnets. "We found that devices first infected with XorDdos were later infected with additional malware such as the Tsunami backdoor, which further deploys the XMRig coin miner," Microsoft notes... Microsoft didn't see XorDdos directly installing and distributing the Tsunami backdoor, but its researchers think XorDdos is used as a vector for follow-on malicious activities...

XorDdoS can perform multiple DDoS attack techniques, including SYN flood attacks, DNS attacks, and ACK flood attacks.

Microsoft's team warns that the trojan's evasion capabilities "include obfuscating the malware's activities, evading rule-based detection mechanisms and hash-based malicious file lookup, as well as using anti-forensic techniques to break process tree-based analysis.

"We observed in recent campaigns that XorDdos hides malicious activities from analysis by overwriting sensitive files with a null byte. It also includes various persistence mechanisms to support different Linux distributions."
This discussion has been archived. No new comments can be posted.

Microsoft Warns of 'Stealthy DDoS Malware' Targeting Linux Devices

Comments Filter:
  • by mark-t ( 151149 ) <markt AT nerdflat DOT com> on Saturday May 21, 2022 @10:04AM (#62554588) Journal
    If you need remote login functionality in the first place, that is, and can't just disable sshd, there is a configuration option to disable root logins, and it seems to me that would probably be enough to stop this particular threat, if it is trying to access your machine that way. I discovered this option for myself by serendipity one day a number of years ago now. Why it does not seem to be the typical out of box configuration setting for sshd in all distros is beyond me.
    • by slazzy ( 864185 ) on Saturday May 21, 2022 @10:17AM (#62554610) Homepage Journal
      If you do need remote root, then make sure you enable key based login and disable password logins.
      • by mark-t ( 151149 ) <markt AT nerdflat DOT com> on Saturday May 21, 2022 @10:23AM (#62554626) Journal
        Or you just add a regular user to the list of sudoers
        • Original poster is right. Use strong key and passphrase and disable password authentication. Sure you can use a sudo access, but if the person breaks in as that user, how does that help you? Granted, the name might not be known but if you've posted anywhere it might be easy to guess as well if someone was determined.

          Even better, is to limit via firewall the list of IPs that can connect to SSH even with a valid key and passphrase. At that point, root would seem to be just as safe. Then ban anything trying t

          • by ls671 ( 1122017 ) on Saturday May 21, 2022 @12:10PM (#62554804) Homepage

            1) You can't enforce strong passphrase at the ssh server level for private keys.
            1a) A private key is private to a given user.
            1b) The user only sends its public key to the server admins in order to be able to login.
            1c) Public keys have no passphrase.
            1d) In order to be really private, the user himself must create his private key with no help at all from the ssh server or ssh server admins. Otherwise, it's not a private key.
            1e) A user can easily create his private key with no passphrase at all, simply type enter twice when using ssh-keygen locally on the user computer to create your private key.

            2) Just a side note for parent, GP and GGP as well, most if not all Linux Distros I have installed lately don't allow root password login by default.

            • There are quite a few ways you can change how SSH functions in the config file. You can lock things down enough to where only specific devices with specific ip addresses can connect to your ssh.

              You can also add a passphrase on top of the keys. The attacker would have to take over a white-listed device and then guess the password. At this point, if you setup no root login, they will have to then find another exploit to get root access.

              Not saying it is not possible, but that's a whole lot more work then just

            • by sjames ( 1099 )

              A private key with no password at all is at least an order of magnitude more secure than allowing passwords for root login.

            • To your second point you are correct, however it is worth noting that sshd still defaults to allow login as root by default and it needs to be disabled in the config file.

              Why this is still a thing in 2022 I don't know. But thank your distributions for their diligence in the wake of silly defaults.

        • by sjames ( 1099 )

          That can be a good option. In other cases, not even that. They can use su - and the root password after logging in as themselves.

          • by mark-t ( 151149 )
            True, but then they are also having to guess unknown usernames, which effectively adds an unknown number of characters to the password, usually no less than 6. The attacker would, at the very least, have to know one or more identities of the users on the system which even had sudo access to effectively reduce the problem back to that of brute forcing the password, and for a decent password that can still take thousands or even tens of thousands of years.
            • by sjames ( 1099 )

              What I'm saying is that if you don't set up sudo, they must guess a user name, guess a password, then in order to get where they want to be, they must then guess yet another password and they must do so actually logged in where they will (should) be more closely monitored and cannot distribute the attack to make it less obvious.

              If you really want to ruin the bad guy's day, ban all use of passwords for logging in to the server.

              • by mark-t ( 151149 )
                That's only possible if you never need need remote access from s system you may not have anticipated needing it for.
      • by splutty ( 43475 )

        No one *needs* remote root. Ever. That's just not a thing.

        • by ls671 ( 1122017 )

          I regularly use ssh keys with no passphrase at all for the backup server to pull backups from servers as root with rsync.

          Proxmox virtual Environment server does exactly the same so cluster members can communicate between them and many other software does exactly the same, it isn't uncommon at all.

          • You have an application that needs read access. You're giving it root access.

            > it isn't uncommon at all

            2.6 million people admitted they smoke meth. So doing meth is even more common. That doesn't make it a good idea.

            • To clarify, the way you have it set up right now, when a bad guy with ransomware gets access to the backup server, they can wipe out BOTH the backups and the production servers. The entire company is gone, overnight.

              Contrast with using a proper backup account, which has read-only access. Getting control of the backup servers would allow the bad guys to delete the backups, but not damage production.

              I prefer to avoid situations that involve complete and absolute destruction of the company.

              • by splutty ( 43475 )

                It seems a lot of people don't seem to understand my statement either. And you're 100% correct. Which was my point as well.

                Thanks. :D

        • Wrong, plenty of advanced use cases. Gaining access via "regular" user who has sudo is just as bad anyway, and besides once on box as regular user there is enough damage that can be done to take over machine for nefarious purposes that don't even need root.

          If you let someone log in you've lost anyway, root or not

        • How tf are you going to use any VPS service ever then?

    • If you need remote login functionality in the first place, that is, and can't just disable sshd, there is a configuration option to disable root logins, and it seems to me that would probably be enough to stop this particular threat, if it is trying to access your machine that way. I discovered this option for myself by serendipity one day a number of years ago now. Why it does not seem to be the typical out of box configuration setting for sshd in all distros is beyond me.

      If IoT devices are vulnerable, how may users know what IoT is, much less what OS is used and how to configure it?

      And how many manufacturers obfuscate how to access configuration settings so to limit tech support calls/returns?

    • by gweihir ( 88907 )

      Unless you disable the root account itself, not allowing remote root-logins does not make you more secure. It makes you less secure, because suddenly you either need sudo (a low-security option at the best of times) or local root login, which is not much better. I have no idea why this myth that you should not use remote root logins persists and I have yet to hear any reasonable explanation for it.

      • by dskoll ( 99328 )

        The only argument against allowing direct root SSH access is that forcing people to log in as themselves and then become root can help with auditing, assuming you log whoever invokes root access (and log it to a different machine.)

        • by gweihir ( 88907 )

          The only argument against allowing direct root SSH access is that forcing people to log in as themselves and then become root can help with auditing, assuming you log whoever invokes root access (and log it to a different machine.)

          Indeed. In an environment where you want to be able to audit root users, that is a possible approach. Does not work too well though.

    • You are expecting admins to do the smart and right thing security wise despite decades of evidence that says they won't?
  • Nobody should be using password authentication for SSH. We've had public-key auth since the beginning; use that, along with a strong passphrase on your private key.

    Also, "Xor-based encryption"? Uh... no. XORing against a fixed string is at most obfuscation, not encryption.

    • But obfuscation IS encryption. All encryption is IS obfuscation. With encryption you obscure the original message, how better the obfuscation how harder it is to get to the original message.
    • "Xor-based encryption" doesn't imply the use of a fixed string. It could refer to any PRNG, even a legit stream cipher.
      I don't know anything about the malware and I don't RTFA.

    • by gweihir ( 88907 )

      And why not? There are people that can use passwords competently. There is absolutely no reason for them to not use password authentication for ssh. Incidentally, passphrases on private keys do not help a lot, one of the reasons I do not use them. All they do is require a attacker that has compromised your system to wait for you to do one log-in and then they have that "good" passphrase as well.

      • by dskoll ( 99328 )

        Yes, I agree the password auth is OK if people can't change their own passwords to something weak and they have to use randomly-generated long passwords generated from a secure random number generator. In practice, nobody does that.

        Your keyboard-sniffing attack against an SSH key passphrase is equally effective against password auth; public-key auth does not protect against that particular attack. However, the malware's attack isn't this kind of attack. It's a brute-force password-guessing attack which

        • by gweihir ( 88907 )

          Yes, I agree the password auth is OK if people can't change their own passwords to something weak and they have to use randomly-generated long passwords generated from a secure random number generator. In practice, nobody does that.

          Actually, this is done in practice, but only if people know what they are doing and high security is a requirement. Since people that know what they are doing are rare in the IT space, I can understand that you have never seen this though. I have. I do it myself. Also, a physically secure environment (give the expected attacker model) makes this a lot easier because you can write down passwords. (A not physically secure environments allows things like cameras pointed on keyboards and is a whole different ga

    • Nobody should be using password authentication for SSH.

      Many organizations use RADIUS-based password authentication for SSH access on the grounds that it is far easier to administer than public key authentication when you have large numbers of users accessing the target system from different locations, and users joining and leaving the organization all the time.

  • People who live in glass houses and all that.

    • Re:Oh Micro$oft.. (Score:5, Informative)

      by jmccue ( 834797 ) on Saturday May 21, 2022 @12:01PM (#62554794) Homepage

      Encourage the use of Microsoft Edge -- vailable on Linux

      That quote from the article makes me very supicious about this article. It is very lite on platforms or architecture, all it seems to say is "Linux is bad mkay"

      I cannot help but wonder if this is limited to Azure or WSL. Who even runs Defender on their Linux System when better options exist ?

      • Who even runs Defender on their Linux System when better options exist ?

        But do they? The reality is these days AV vendors have shat in the bed so long without cleaning it up that it's not a given that "better options exist".

        But really the reality is that Linux isn't some magical perfect thing and sadly yes "Linux bad mkay" is a good way of describing the fact that now in 2022 sshd still defaults to permitting password based logins as root even at a time when large parts of the Linux world are trending towards disabling the root account entirely.

    • by gweihir ( 88907 )

      No. You completely missed the problem. SSH password authentication works fine. As any password authentication, it is only secure with a good password that gets used nowhere else. The problem here is people using bad passwords on their root accounts.

      • I did not miss anything: disable SSH password login and the problem you describe goes away.

        • I did not miss anything: disable SSH password login and the problem you describe goes away.

          You never said "disable" in your original post you walking example of dementia.

    • by ebvwfbw ( 864834 )

      'nuff said.

      Not really. I worked at a high profile Government agency and none of my Solaris/Irix/Linux machines were ever penetrated. Windows machines were regularly penetrated. Then they wanted to go to paid monitoring with HP tools. Pointy haired boss types. So in 2019 a pen team finally managed to breach a Linux system. The way they did it was to compromise the Windows domain first, which they did in about 20 minutes from an office off premises and in another state. The only connection via internet. They kept on goi

  • Comment removed based on user account deletion
  • root ssh log in? Who would enable that on purpose? Where would that be required?
    • Well I can name you one: IBM GPFS.

      It's a supercomputer-class high performance parallel file system (meaning something designed to run on hardware that costs multiple millions per rack, that starts at around 10-20GBps throughput). But the ESS (extreme scale storage) software suite that drives those banks of SSDs compares to a network filesystem in much the way an entire aircraft compares to a turbofan engine.

      Besides high performance storage (the fastest single-threaded sequential IO I've ever seen... i
      • Comment removed based on user account deletion
        • Well, not passwords, it uses a preshared public key. It may or may not work with encrypted keys, but my guess is not. I suspect that the command line utilities spawn processes in a way that doesn't allow them to request the key password, and I'm very sure that the EMS web console (which of course just invokes the same commands on the backend) can't request them.

          Maybe it's terminology... GP said "root ssh login," which I see as covering both password and public key authentication.

          A caveat... 100% ESS n
    • by gweihir ( 88907 )

      I do. I happen to be a security expert. There is no sane reason to not allow ssh root login and instead compromise system security by using sudo. (I do not use sudo.) It is one of the many irrational myths in the IT security space that you should not allow direct root login. Of course you need to use either a good password or certificate-based login, but that is it.

      • Comment removed based on user account deletion
        • by gweihir ( 88907 )

          I completely disagree. Certificates have the problem that they are typically in place, i.e. directly usable by an attacker that compromises the account with the certificate. Passwords can be kept offline and even can be put in sealed envelopes, distributed over several users, etc., and are only present on the computer on actual access.

    • That's the wrong question. The question is who wouldn't disable it. Even now SSH remote logins as root is enabled by default unless disabled via the sshd config.

      It's the dumbest example of something that should be opt in in the open source community but somehow still isn't.

  • It's convenient to allow password-based logins from the local network but not from anywhere else. Not that you need to use passwords locally very often, but it's still a handy thing to have available when you do have a user for it when setting up new equipment and the like.

    Use the Match Address function in sshd_config to do this.

    I wrote up exact instructions here but Slashdot's Security Service (I never knew it had one, something to do with Cloudflare according to the page that came up) blocked me from pos

    • by gweihir ( 88907 )

      Absolutely not needed. Just use reasonable passwords.

      • I disagree.

        A "hack resistant" twenty-character password made up of random letters and numbers isn't a reasonable thing to retype every time you set up a device and get to the point that you need log into the fileserver to copy a configuration file.

        Disabling remote passwords while allowing them on the local network avoids that headache.

        • by gweihir ( 88907 )

          Your math is borked. This is an ssh-login and the only thing an attacker can do is trial-logins. You are secure against that at significantly shorter and less complex passwords. This attack is possible because the machines attacked use pathetic passwords.

  • Do they mean a stream cipher?

    • Not necessarily. A lot of malware uses very simple encoding or encryption, because it is easy to code, fast, and it doesn't give off signatures like AES or Blowfish. And it is "good enough" to get the job done.
      • by gweihir ( 88907 )

        AES and Blowfish do not "give off" signatures at all. They cannot, just like all other block ciphers. That is a direct consequence from input block size being the same as output block size. All that can happen with block ciphers is that patterns from the plaintext leak through. Are you talking about headers or the like? Vigenère encryption (which I gather is this "alternative") leaks patterns from the input like crazy though.

  • Exposing root login over SSH to the internet is to be avoided unless you have no other option. A WireGuard VPN is great here becuase it won't respond to packets that don't authenticate.

    I used to use OpenVPN for remote connections on TCP port 443. I thought it was clever since it looked like HTTPS traffic and would not be blocked by some random hotel's network connection when I traveled. However, I quickly learned that there are many bots that attempt to connect to TCP port 443. My OpenVPN server was cons
  • ...says the MS engineers that developed the trojan.
    Do ya think?

In the long run, every program becomes rococco, and then rubble. -- Alan Perlis

Working...