this post was submitted on 29 Oct 2023
275 points (93.9% liked)

Technology

59396 readers
2618 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Antivirus provider Kaspersky uncovers a sophisticated piece of 'StripedFly' malware camouflaged as a cryptocurrency miner that's been targeting PCs for more than five years.

top 50 comments
sorted by: hot top controversial new old
[–] sir_reginald 93 points 1 year ago* (last edited 1 year ago) (3 children)

this makes use of an old windows specific vulnerability. Linux is only mentioned on the title, not again in the whole article. clickbait.

edit: downvote me if you want, but the original article didn't say a thing about Linux.

[–] Salamendacious 35 points 1 year ago (1 children)

https://www.bleepingcomputer.com/news/security/stripedfly-malware-framework-infects-1-million-windows-linux-hosts/

On Linux, the malware assumes the name 'sd-pam'. It achieves persistence using systemd services, an autostarting .desktop file, or by modifying various profile and startup files, such as /etc/rc*, profile, bashrc, or inittab files.

[–] Buffalox 47 points 1 year ago (6 children)

That's from a completely different article.

And it doesn't say how this is achieved without already having root privilegies. I'm not sure I believe this can in fact infect a Linux system, except if it's already heavily compromised, for instance by a user logging in as root as default.

[–] [email protected] 9 points 1 year ago

.bashrc and .profile can be modified without root, as can autostarting .desktop files. I think systemd and anything in /etc require root though.
Also a lot of users set sudo to not require a password (I am guilty of this) which makes privilege escalation easy.

[–] abhibeckert 3 points 1 year ago* (last edited 1 year ago)

It is a different article, but both articles are simply reporting research by Kaspersky, and Kaspersky goes into quite a bit of depth covering the Linux side of the threat, which is very real. PCMag focuses mostly on the windows side, because it's a windows focused site.

This isn't a single exploit, this is a "framework" that can take advantage of multiple exploits and will use which ever one it can find. You don't need to be "heavily compromised" you just need to be vulnerable to one of the compromises. And you definitely don't need root either.

load more comments (4 replies)
[–] Buffalox 19 points 1 year ago* (last edited 1 year ago) (2 children)

It does include this:

quietly spread across a victim’s network, including to Linux machines.

But that's a completely ridiculous lack of detail of any actual vulnerability. Smells like bullshit.
The quote from OP is from a different article.

[–] Salamendacious 10 points 1 year ago* (last edited 1 year ago) (1 children)

I wasn't intentionally trying to imply that it came from the article. That's why I posted the naked link. I wasn't really thinking about the Linux component when I posted the article.

[–] Buffalox 11 points 1 year ago

That’s why I posted the naked link.

Which is perfectly fine and dandy. I think some people just had a knee jerk reaction, based on a misunderstanding of context.

load more comments (1 replies)
[–] [email protected] 17 points 1 year ago (1 children)

It does though: "On Linux, the malware assumes the name 'sd-pam'. It achieves persistence using systemd services, an autostarting .desktop file, or by modifying various profile and startup files, such as  /etc/rc*, profile, bashrc, or inittab files."

So technically useless . it can't do shit.

[–] [email protected] 2 points 1 year ago

It can pwn poorly configured dev systems.

[–] [email protected] 88 points 1 year ago (3 children)

Malware disguised as malware? Interesting

[–] [email protected] 22 points 1 year ago

It's always the one you least suspect, like disguising yourself as an impersonation of yourself.

[–] edgemaster72 18 points 1 year ago (1 children)

It's just malware all the way down

[–] Salamendacious 7 points 1 year ago (1 children)
[–] edgemaster72 7 points 1 year ago (1 children)

A disc of malware resting on top of 4 malware elephants, riding a giant malware turtle

[–] Salamendacious 3 points 1 year ago

Morris balanced on Michelangelo standing on the shoulders of ILOVEYOU holding stuxnet giving HeartBleed

[–] Salamendacious 6 points 1 year ago

It's like inception

[–] Buffalox 35 points 1 year ago* (last edited 1 year ago) (3 children)

According to Kaspersky, StripedFly uses its own custom EternalBlue attack to infiltrate unpatched Windows systems and quietly spread across a victim’s network, including to Linux machines.

Yeah I call bullshit on that. Absolutely zero description of any vulnerability.

[–] Salamendacious 17 points 1 year ago (2 children)

This is a different article but you should find at least some more information on how the malware works with Linux here:

https://www.bleepingcomputer.com/news/security/stripedfly-malware-framework-infects-1-million-windows-linux-hosts/

I'm not a Linux user so I honestly don't know if that article is incredibly helpful or not.

[–] [email protected] 19 points 1 year ago* (last edited 1 year ago) (3 children)

From what it's describing, it sounds like it would only impact Linux computers that allow SMB1 access, such as domain-joined systems with samba access allowed. It sounds like this would target mainly enterprise Linux deployments but home Linux setups should be fine for the most part.

[–] Eyron 11 points 1 year ago (1 children)

They describe an SSH infector, as well as a credentials scanner. To me, that sounds like it started like from exploited/infected Windows computers with SSH access, and then continued from there.

With how many unencrypted SSH keys there are, how most hosts keep a list of the servers they SSH into, and how they can probably bypass some firewall protections once they're inside the network: not a bad idea.

[–] Salamendacious 6 points 1 year ago

I think the original article talked about "spreading" to Linux machines so that generally tracks with what you're saying that it starts on a Windows machine that itself has access to a Linux machine.

load more comments (1 replies)
[–] Buffalox 1 points 1 year ago* (last edited 1 year ago) (1 children)

From the part you quoted earlier, it's absolutely useless, and not worth reading.

[–] Salamendacious 2 points 1 year ago

That's fair

[–] [email protected] 7 points 1 year ago

I don't know why op did not want to share the original report, but it is linked in the article: https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/

[–] [email protected] 6 points 1 year ago* (last edited 1 year ago) (2 children)

I too am struggling to find the actual Linux vuln. It sounds like it steals ssh keys, so maybe just poorly configured hosts?

load more comments (2 replies)
[–] [email protected] 7 points 1 year ago (1 children)

Why would the article not share the name of the miner in question?

load more comments (1 replies)
load more comments
view more: next ›