MESSAGE
DATE | 2015-11-08 |
FROM | Rick Moen
|
SUBJECT | Re: [Hangout-NYLXS] ransomware - attacking apache
|
Quoting Ruben Safir (mrbrklyn-at-panix.com):
> http://techcrunch.com/2015/11/06/linux-ransomware-is-now-attacking-webmasters/ > > Linux Ransomware Is Now Attacking Webmasters ^^^^^^^^^ > Posted yesterday by John Biggs (-at-johnbiggs) > Next Story > > A new bit of ransomware is now attacking Linux-based machines, ^^^^^^^^^
And the hook is set with a deliberately false statement and false headline. Let's see how many paragraphs before it unravels.
> specifically the folders associated with serving web pages. Called > Linux.Encoder.1 the ransomware will encrypt your MySQL, Apache, and > home/root folders. The system then asks for a single bitcoin to decrypt > the files. > > From Dr.Web Antivirus: > > Once launched with administrator privileges, the Trojan dubbed ^^^^^^ > Linux.Encoder.1 downloads files containing cybercriminals’ demands and a > file with the path to a public RSA key. After that, the malicious > program starts as a daemon and deletes the original files. Subsequently, > the RSA key is used to store AES keys which will be employed by the > Trojan to encrypt files on the infected computer.
_One_ paragraph to the Great Unraveling. In the next one, author Biggs drops this being a trojan; a bit of monkeyshines performed on a system after it has been exploited through other means entirely. The problem the system administrator must be concerned about is not Linux.Encoder.1 but rather the vulnerability that gives the intruder access, after which trojans are the least of the sysadmin's problems.
So, basically this is yet another stupid, badly written security article targeted at gullible readers who don't understand much -- and doesn't actually say anything of interest.
I have duly added Linux.Encoder.1 to category 'IV. The Ringers. Post-Compromise Rootkits (Trojan, Worm) and Attack Tools (not malware at all)' on http://linuxmafia.com/~rick/faq/#virus4 . To quote the comment paragraphs I wrote immediately after the long alphabetical list of 'ringer' codebases (invariably promoted by antimalware companies to line their pocketbooks):
Every one of those is some sort of _post-attack_ tool; all are erroneously claimed on sundry anti-virus companies' sites (and consequently in various news articles) to be "Linux viruses". Some are actually "rootkits", which are kits of software to hide the intruder's presence from the system's owner and install "backdoor" re-entry mechanisms, after the intruder's broken in through other means entirely. Some are "worms"/"trojans" of the sort that get launched locally on the invaded system, by the intruder, to probe it and remote systems for further vulnerabilities. Some are outright attack tools of the "DDoS" (distributed denial of service) variety, which overwhelm a remote target with garbage network traffic from all directions, to render it temporarily non-functional or incommunicado.
The news reporters and anti-virus companies in question should be ashamed of themselves: None of the above, in itself, can break into any remote Linux system. All must be imported manually and installed by an intruder who has cracked your system by other means.
One notes that John Biggs at least is good enough to credit 'Dr.Web anti-virus' -- a 'Russian IT-security solutions vendor developing Dr.Web anti-virus for businesses and personal use, as well as anti-virus as a service since 1992' (ta-dah!) as his source for this so-called news story.
Also, Mr. Biggs _does_ also lamely throw this in at the end:
> The malware requires administrator privileges to run and, presumably, > a sysadmin who would allow for such a program to run unbridled.
Two thing, Mr. Biggs: (1) Did you notice that this means Linux.Encoder.1 is not 'attacking' Linux machines and webmasters as claimed in your headline and lead sentence? Or were you too busy copying and pasting from Dr.Web? (2) No, Mr. Biggs, typically the sysadmin would not wake up one morning and decide 'Today I want to allow post-attack tools to run.' Instead, the sysadmin would leave open some unrelated security weakness permitting intrusion and escalation of privilege to root, and _that_ is the 'attack'.
Rubbish, dimwitted story, as per usual. Practically all IT journalism stories about Linux security are just ill-concealed PR material from antivirus firms (Dr.Web, Avira, F-Secure, Kaspersky Lab, McAfee, Panda Security, Sophos, and Symantec, among others) republished by tech journalists with low standards desperate to achieve line-inches with low effort under deadline pressure, and this was no exception.
> The team recommends backing up all data and keeping all files in place > if you’re attacked until researchers create a decryption system.
The 'team' are a bunch of idiots. What readers _should_ be doing is systematic periodic backups and meaningful system security.
Ruben, why did you copy and paste this idiocy that Biggs copied and pasted from an antivirus firm? Do you need a hobby?
http://techcrunch.com/author/john-biggs/ says 'Biggs is the East Coast Editor of TechCrunch. [...] He is the former editor-in-chief of Gizmodo.com and lives in Bay Ridge, Brooklyn.'
I'm sorry for Brooklyn. I _like_ Brooklyn.
-- Cheers, "If you see a snake, just kill it. Rick Moen Don't appoint a committee on snakes." rick-at-linuxmafia.com -- H. Ross Perot McQ! (4x80) _______________________________________________ hangout mailing list hangout-at-nylxs.com http://www.nylxs.com/ |
|