Powerful, highly stealthy Linux trojan may have infected vic

For discussions about security.
Post Reply
Message
Author
User avatar
James C
Posts: 6618
Joined: Thu 26 Mar 2009, 05:12
Location: Kentucky

Powerful, highly stealthy Linux trojan may have infected vic

#1 Post by James C »

Powerful, highly stealthy Linux trojan may have infected victims for years

http://arstechnica.com/security/2014/12 ... for-years/
Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.

The previously undiscovered malware represents a missing puzzle piece tied to "Turla," a so-called advanced persistent threat (APT) disclosed in August by Kaspersky Lab and Symantec. For at least four years, the campaign targeted government institutions, embassies, military, education, research, and pharmaceutical companies in more than 45 countries. The unknown attackers—who are probably backed by a nation-state, according to Symantec—were known to have infected several hundred Windows-based computers by exploiting a variety of vulnerabilities, at least two of which were zero-day bugs. The malware was notable for its use of a rootkit that made it extremely hard to detect.

User avatar
battleshooter
Posts: 1378
Joined: Wed 14 May 2008, 05:10
Location: Australia

#2 Post by battleshooter »

Interesting. I wonder if it nests itself in an actual hard drive partition or Linux system? I've destroyed so many Pup saves even within a week I don't think it would have had much of a chance on my system unless it operated outside of the actual system.
[url=http://www.murga-linux.com/puppy/viewtopic.php?t=94580]LMMS 1.0.2[/url], [url=http://www.murga-linux.com/puppy/viewtopic.php?t=94593]Ardour 3.5.389[/url], [url=http://www.murga-linux.com/puppy/viewtopic.php?t=94629]Kdenlive 0.9.8[/url]

User avatar
mikeb
Posts: 11297
Joined: Thu 23 Nov 2006, 13:56

#3 Post by mikeb »

So its a linux trojan but came through windows?????

A bit unclear...and using windows as a gateway is standard procedure for any naughty stuff anyway...

Mike

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#4 Post by Lobster »

Always glad to hear the international spies 'r us are doing their bit to make black hatting fashionable.

I would remind the terminally paranoid to run puppy from CD, in a cage, for short periods, and not store the results (so a fresh set up)

For those who do not care that much, run as root, Puppy style and have a good laugh . . .

. . . And yes I did write Growl Security program for Puppy and never use it . . . 8)
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
Lobster
Official Crustacean
Posts: 15522
Joined: Wed 04 May 2005, 06:06
Location: Paradox Realm
Contact:

#5 Post by Lobster »

Yes it really is me impersonating a cructacean . . . see below . . . I am back from the AI computer Paradox realm for a short visit from where penguins and cructaceans are just part of the cloud . . . :roll:
Last edited by Lobster on Tue 09 Dec 2014, 13:11, edited 1 time in total.
Puppy Raspup 8.2Final 8)
Puppy Links Page http://www.smokey01.com/bruceb/puppy.html :D

User avatar
battleshooter
Posts: 1378
Joined: Wed 14 May 2008, 05:10
Location: Australia

#6 Post by battleshooter »

Lobster! No way mate, haven't seen you in ages! Welcome back!
[url=http://www.murga-linux.com/puppy/viewtopic.php?t=94580]LMMS 1.0.2[/url], [url=http://www.murga-linux.com/puppy/viewtopic.php?t=94593]Ardour 3.5.389[/url], [url=http://www.murga-linux.com/puppy/viewtopic.php?t=94629]Kdenlive 0.9.8[/url]


User avatar
8Geee
Posts: 2181
Joined: Mon 12 May 2008, 11:29
Location: N.E. USA

#8 Post by 8Geee »

The linux branch of the virus. Note coding in C/C++ which is common.
Like its Windows counterparts, the Linux trojan is extremely stealthy. It can't be detected using the common netstat command. To conceal itself, the backdoor sits dormant until attackers send it unusually crafted packets that contain "magic numbers" in their sequence numbers. The malware may have sat unnoticed on at least one victim computer for years, although Kaspersky Lab researchers still have not confirmed that suspicion. The trojan is able to run arbitrary commands even though it requires no elevated system privileges.

"It's a very interesting piece of code," Baumgartner said. "Not only does it run on Linux, but you can't detect it in the usual ways."

Even a regular user with limited privileges can launch it, allowing it to intercept traffic and run commands on infected machines. Capabilities include the ability to communicate with servers under the control of attackers and functions allowing attackers to run commands of their choice and perform remote management.

Even after its discovery, the Linux component remains a mystery. The underlying executable file is written in the C and C++ languages and contains code from previously written libraries, a property that gives the malicious file self-reliance. The code is also stripped of symbol information, making it hard for researchers to reverse engineer or analyze. As a result, Baumgartner said the trojan may have capabilities that have not yet been uncovered.
Linux user #498913 "Some people need to reimagine their thinking."
"Zuckerberg: a large city inhabited by mentally challenged people."

User avatar
mikeb
Posts: 11297
Joined: Thu 23 Nov 2006, 13:56

#9 Post by mikeb »

Ok its been used against windows machines.

So how does it get into a linux machine?

mike

bark_bark_bark
Posts: 1885
Joined: Tue 05 Jun 2012, 12:17
Location: Wisconsin USA

#10 Post by bark_bark_bark »

mikeb wrote:Ok its been used against windows machines.

So how does it get into a linux machine?

mike
I don't know how it would get on a linux computer.

BUT....

If it was from Linux to windows, then the easy answer is the ntfs-3g driver.
....

User avatar
mikeb
Posts: 11297
Joined: Thu 23 Nov 2006, 13:56

#11 Post by mikeb »

If it was from Linux to windows, then the easy answer is the ntfs-3g driver.
in what way??. I mean apart from deliberate human action?

mike

bark_bark_bark
Posts: 1885
Joined: Tue 05 Jun 2012, 12:17
Location: Wisconsin USA

#12 Post by bark_bark_bark »

mikeb wrote:
If it was from Linux to windows, then the easy answer is the ntfs-3g driver.
in what way??. I mean apart from deliberate human action?

mike
ntfs-3g driver provides access to windows file systems.

I am not saying the driver is the problem and that the malware is exploiting it. I am saying that the driver opens the gate to the file system of a vulnerable OS (Windows).
....

User avatar
mikeb
Posts: 11297
Joined: Thu 23 Nov 2006, 13:56

#13 Post by mikeb »

but its not going to leap out by itself.

all these threats but no one mentions how exactly they get on yer system.....or if they ever do. This one only mentions ACTUAL contamination of windows operating systems .

only caution in this case might be don't run wine as root and add IE to it and thats a long shot.

A windows executable written in C will still only affect windows...why would there be an elf(linux) build present on windows?

mike

User avatar
Sky Aisling
Posts: 1368
Joined: Sat 27 Jun 2009, 23:02
Location: Port Townsend, WA. USA

#14 Post by Sky Aisling »

bark_bark_bark writes:
If it was from Linux to windows, then the easy answer is the ntfs-3g driver.
Can you explain this a bit more?

Thank you.

User avatar
8Geee
Posts: 2181
Joined: Mon 12 May 2008, 11:29
Location: N.E. USA

#15 Post by 8Geee »

I would also like to ask if WINE is susceptible, as its a linux<--->windoez bridge.
Linux user #498913 "Some people need to reimagine their thinking."
"Zuckerberg: a large city inhabited by mentally challenged people."

cthisbear
Posts: 4422
Joined: Sun 29 Jan 2006, 22:07
Location: Sydney Australia

#16 Post by cthisbear »

Talking about Trojans and El Lobster is back after years of neglect.

Coincidence???

Welcome back mate....Chris.

User avatar
Burn_IT
Posts: 3650
Joined: Sat 12 Aug 2006, 19:25
Location: Tamworth UK

#17 Post by Burn_IT »

You completely mis-interpreted that sentence about Windows.

It did NOT say it got in through Windows; It said it got in in a similar manner that was used to infect Windows.
Like its Windows counterparts, the Linux trojan is extremely stealthy. It can't be detected using the common netstat command.
"Just think of it as leaving early to avoid the rush" - T Pratchett

User avatar
mikeb
Posts: 11297
Joined: Thu 23 Nov 2006, 13:56

#18 Post by mikeb »

I am just trying to get concrete information.
It did NOT say it got in through Windows; It said it got in in a similar manner that was used to infect Windows.
That in itself is so vague its meaningless. And what about viral gateways in windows do not exist on linux for starters...I am very curious about what 'similar' method they are talking about.

'may have infected' means nothing..hence my assumption that there are only known windows infections. That sounds like journalistic speculation.

I ask questions to get answers...still waiting for someone to decipher this into the real world and how it affects linux so we can defend against it IF it is a real threat.

mike

User avatar
mikeb
Posts: 11297
Joined: Thu 23 Nov 2006, 13:56

#19 Post by mikeb »

The malware may have sat unnoticed on at least one victim computer for years, although Kaspersky Lab researchers still have not confirmed that suspicion.
again there is not even one definite in there.

It tells you it exists and what it can do but no confirmation of its use and nothing about how its supposed to get there.

mike

User avatar
Burn_IT
Posts: 3650
Joined: Sat 12 Aug 2006, 19:25
Location: Tamworth UK

#20 Post by Burn_IT »

"And what about viral gateways in windows do not exist on linux for starters."

I'm curious as to what they mean by this as well. (Not taking sides here!)
"Just think of it as leaving early to avoid the rush" - T Pratchett

Post Reply