this post was submitted on 04 Oct 2024
94 points (85.6% liked)

Technology

58451 readers
4976 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 24 comments
sorted by: hot top controversial new old
[–] [email protected] 21 points 1 hour ago (1 children)

Shouldn’t be this hard to find out the attack vector.

Buried deep, deep in their writeup:

RocketMQ servers

  • CVE-2021-4043 (Polkit)
  • CVE-2023-33246

I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.

Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.

[–] [email protected] 3 points 43 minutes ago

There's also a buried reference to using a several-years-patched gpac bug to gain root access before this thing can do most of its stealth stuff.

Basically, it needs your system to already have a known, unpatched RCE bug before it can get a foothold, and if you've got one of those you have problems that go way beyond stealth crypto miners stealing electricity.

[–] [email protected] 22 points 2 hours ago (1 children)

Seeing the diagram, it only attacks servers with misconfigured rocketMQ or CVE-2023-33426, which is already patched. Am I understanding this correctly?

[–] [email protected] 6 points 1 hour ago

It probably has a large database of exploits it can use. The article claims 20k, but this seems to high for me.

[–] Buffalox 34 points 2 hours ago* (last edited 2 hours ago) (2 children)

This story reeks of FUD.

exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets,

Because a "common misconfiguration" will absolutely make your system vulnerable!?!
OK show just ONE!

This is FUD to either prevent people from using Linux, or simply a hoax to get attention, or maybe to make you think you need additional security software.

[–] [email protected] 16 points 2 hours ago (1 children)

Crowd strike looking for a new market?

[–] ITeeTechMonkey 13 points 2 hours ago
[–] [email protected] 1 points 1 hour ago

ssh with an easy to guess root password?

[–] [email protected] 47 points 3 hours ago (2 children)

Can't be infected if I keep wiping my partition for a new shiny distro

[–] [email protected] 17 points 3 hours ago (1 children)

Your install USB is infected by a rookit and reinstalls itself on connect.

[–] NiHaDuncan 10 points 2 hours ago (1 children)

Jokes on you, the rootkit is likely my own and I just forgot about it.

[–] [email protected] 5 points 2 hours ago

It's tough being an ADHD Hacker

[–] saddlebag 2 points 2 hours ago

This was my first thought. I haven’t had the same os installed for a few months max, nevermind 3 years

[–] [email protected] 35 points 3 hours ago (2 children)

No mention of transmission methods as far as I understand the article

[–] Buffalox 34 points 2 hours ago (1 children)

The whole thing sounds fishy. Like it's trying to convince people Linux is inherently vulnerable.

exploiting more than 20,000 common misconfigurations

Like WTF?

[–] [email protected] 1 points 49 minutes ago

It's kind of an iffy assertion. That's maybe the number of files it scans looking for misconfigurations it can exploit, but I'd bet there's a lot of overlap in the potential contents of those files (either because of cascading configurations, or because they're looking for the same file in slightly different places to mitigate distro differences). So the number of possible exploits is likely far fewer.

[–] [email protected] 10 points 2 hours ago

They have an "attack flow" diagram that seems to indicate a hacker installing it directly through a known vulnerability.

[–] [email protected] 12 points 3 hours ago (3 children)

Sounds like it should at least be noticeable if you monitor resource usage?

[–] linearchaos 3 points 2 hours ago* (last edited 1 hour ago)

Vulnerable to 20,000 misconfigurations, But thearted by 42 billion different simple checks that we all do anyway.

5 minute load greater than 80% of the number of cores? That's an alarm.....

[–] [email protected] 2 points 1 hour ago* (last edited 1 hour ago) (1 children)

Yes, but they replace common tools like top or lsof with manipulated versions. This might at least trick less experienced sysadmins.

Edit: Some found out about the vulnerability by ressource alerts. Probably very easy in a virtualized environment. The malware can't fool the hypervisor ;)

[–] [email protected] 2 points 1 hour ago

Not quite the monitoring I’m talking about though.

Basically, it seems like this would be a nightmare for a home user to detect, but a company is probably gonna pick up on this quite quickly with snmp monitoring (unless it somehow does something to that).

[–] Pantsofmagic 9 points 3 hours ago (1 children)

That's how some people found it, but it would disappear when someone would login to investigate.

[–] [email protected] 8 points 2 hours ago

Sure, but it’s still fairly detectable when it’s on a server at least, as long as you have monitoring. Just a bitch to pinpoint and fix.

[–] [email protected] -2 points 2 hours ago

Millions of systems shut down by dumb microsoft os.