Security researchers identify new malware targeting Linux

(welivesecurity.com)

58 points | by heresie-dabord 8 hours ago ago

13 comments

  • linsomniac 5 hours ago

    If I am skimming this correctly, this is a C&C client allowing remote control over the network, and uses "a rootkit" for further compromise once it somehow gets installed?

    I understand the value of in-depth security reports, but the 5th time they told me "WolfsBane is the Linux counterpart of Gelsevirine, while FireWood is connected to Project Wood." I was wondering when I'd get to the meat and potatoes.

    • gerdesj 4 hours ago

      "once it somehow gets installed?"

      The report mentions: "we conclude ... exploited an unknown web application vulnerability ... ."

      The chain of events, post initial exploit, is all very well but what was the initial point of entry? The IoCs etc are welcome - thanks.

      • aorloff 39 minutes ago

        I thought SQL injection but actually Tomcat ? Might be just an old unpatched server allowing PUTs

    • PcChip 2 hours ago

      I agree it was very wordy

  • snvzz 5 hours ago

    For signs of the analyzed version, there's this file:

    /lib/systemd/system/display-managerd.service

    And a process called "kde".

  • ajsnigrutin 2 hours ago

    So, an aplication started as root it does a lot, if started as a normal user, does less. Sure, any first year CS student can write something like that. Or you can.. well.. install an ssh server or a vnc server or whatever.

    How it gets onto the system in the first place is the interesting (and dangerous) part, that sadly gets skimmed over here.

  • TacticalCoder 3 hours ago

    > The FireWood backdoor, in a file named dbus, is the Linux OS continuation of the Project Wood malware... > The analyzed code suggests that the file usbdev.ko is a kernel driver module working as a rootkit to hide processes.

    Where is the backdoor coming from? If there's a backdoor, something is backdoored. An unknown exploit installing a rootkit and using a modified file, like usbdev.ko, is not a backdoor.

    Which pakage / OS ships with the backdoor?

    Or doesn't the author of TFA know the definition of a backdoor? Or is it me? I mean, to me the XZ utils exploit attempt was a backdoor (for example). But I see nothing here indicating the exploit they're talking about is a backdoor.

    It reads like they classify anything opening ports and trying to evade detection as "backdoors".

    Am I going nuts?

    • NegativeK 43 minutes ago

      I don't think you're going nuts, but I do think your definition of backdoor is a specific subset.

    • remram an hour ago

      Fits the usual definition, e.g. from Wikipedia:

      > A backdoor is a typically covert method of bypassing normal authentication or encryption

  • stepupmakeup 3 hours ago

    What's the point of these kinds of articles? Most Linux malware (including this one) are not sophisticated at all, built off of pre-existing rootkit code samples off Github and quite sloppy with leaving files and traces (".Xl1", modifying bashrc, really?). And there's a weird fixation on China here, is it just more anti-China propaganda?

    • jamesmotherway 2 hours ago

      Threat actors don't create malware to impress people; they do it to accomplish their goals. Apparently, this sample was sufficient for them.

      Security companies attribute activity based on their observations. ESET- a Slovakian company- is no exception.

      • stepupmakeup 2 hours ago

        I was under the impression that persistent, but SILENT access was China's goal. Dropping files in home and /tmp/ seems like the total opposite of that and any competent sysadmin would detect these anomalies manually real quick with a simple "ls -a", even possibly by accident.

        • NegativeK an hour ago

          Chinese threat actors are not one homogeneous group. Just like every other country out there.