Powerful Malware Disguised as Crypto Miner Infects 1M+ Windows, Linux PCs (www.pcmag.com)
from Salamendacious@lemmy.world to technology@lemmy.world on 29 Oct 2023 09:57
https://lemmy.world/post/7486952

Antivirus provider Kaspersky uncovers a sophisticated piece of ‘StripedFly’ malware camouflaged as a cryptocurrency miner that’s been targeting PCs for more than five years.

#technology

threaded - newest

sir_reginald@lemmy.world on 29 Oct 2023 10:21 next collapse

this makes use of an old windows specific vulnerability. Linux is only mentioned on the title, not again in the whole article. clickbait.

edit: downvote me if you want, but the original article didn’t say a thing about Linux.

Salamendacious@lemmy.world on 29 Oct 2023 10:28 next collapse

bleepingcomputer.com/…/stripedfly-malware-framewo…

On Linux, the malware assumes the name ‘sd-pam’. It achieves persistence using systemd services, an autostarting .desktop file, or by modifying various profile and startup files, such as /etc/rc*, profile, bashrc, or inittab files.

Buffalox@lemmy.world on 29 Oct 2023 11:33 collapse

That’s from a completely different article.

And it doesn’t say how this is achieved without already having root privilegies. I’m not sure I believe this can in fact infect a Linux system, except if it’s already heavily compromised, for instance by a user logging in as root as default.

Salamendacious@lemmy.world on 29 Oct 2023 11:42 next collapse

I’m not a Linux user (except for Chromebook and Android) so honestly the Linux section wasn’t personally important to me. Another commentor wanted more information on the Linux side so I looked briefly if I could find an article that might be helpful. Linux terminology is all Greek to me so I honestly wouldn’t know. I thought the article was interesting and I thought other people might find it interesting. The Linux part didn’t even enter into my mind.

LDerJim@lemmy.world on 29 Oct 2023 12:55 next collapse

Maybe if root is shared via SMB1 and is rw

Buffalox@lemmy.world on 29 Oct 2023 13:03 collapse

Not possible AFAIK, I don’t use anything Microsoft, but AFAIK SMB1 shares on Linux are through Samba, and you can’t just enable write permissions without root. So as I stated before, the Linux system needs to be already compromised.

LDerJim@lemmy.world on 29 Oct 2023 14:05 collapse

Users can configure the system however they want.

LostXOR@kbin.social on 29 Oct 2023 14:09 next collapse

.bashrc and .profile can be modified without root, as can autostarting .desktop files. I think systemd and anything in /etc require root though.
Also a lot of users set sudo to not require a password (I am guilty of this) which makes privilege escalation easy.

abhibeckert@lemmy.world on 30 Oct 2023 00:34 collapse

It is a different article, but both articles are simply reporting research by Kaspersky, and Kaspersky goes into quite a bit of depth covering the Linux side of the threat, which is very real. PCMag focuses mostly on the windows side, because it’s a windows focused site.

This isn’t a single exploit, this is a “framework” that can take advantage of multiple exploits and will use which ever one it can find. You don’t need to be “heavily compromised” you just need to be vulnerable to one of the compromises. And you definitely don’t need root either.

Buffalox@lemmy.world on 29 Oct 2023 11:35 next collapse

It does include this:

quietly spread across a victim’s network, including to Linux machines.

But that’s a completely ridiculous lack of detail of any actual vulnerability. Smells like bullshit.
The quote from OP is from a different article.

Salamendacious@lemmy.world on 29 Oct 2023 11:52 next collapse

I wasn’t intentionally trying to imply that it came from the article. That’s why I posted the naked link. I wasn’t really thinking about the Linux component when I posted the article.

Buffalox@lemmy.world on 29 Oct 2023 12:20 collapse

That’s why I posted the naked link.

Which is perfectly fine and dandy. I think some people just had a knee jerk reaction, based on a misunderstanding of context.

[deleted] on 29 Oct 2023 12:48 collapse

.

hornedfiend@sopuli.xyz on 29 Oct 2023 16:42 collapse

It does though: “On Linux, the malware assumes the name ‘sd-pam’. It achieves persistence using systemd services, an autostarting .desktop file, or by modifying various profile and startup files, such as  /etc/rc*, profile, bashrc, or inittab files.”

So technically useless . it can’t do shit.

Socsa@sh.itjust.works on 29 Oct 2023 17:12 collapse

It can pwn poorly configured dev systems.

ianovic69@feddit.uk on 29 Oct 2023 11:32 next collapse

cryptocurrency miner

There seems to be a simple and obvious way around this, or do we still think crypto stuff isn’t a fucked up load of bollocks for cunts?

CriticalMiss@lemmy.world on 29 Oct 2023 12:53 collapse

I won’t argue about the legitimacy of crypto simply because I don’t care enough but you have to be fucking stupid to run non-FOSS crypto miners and instead go with something proprietary like this and then be surprised it fucks up your shit.

Salamendacious@lemmy.world on 29 Oct 2023 17:20 next collapse

Is there a difference between FLOSS & FOSS? Besides the word libre?

CriticalMiss@lemmy.world on 29 Oct 2023 19:31 collapse

Libre is Spanish for free, so I guess not.

HaggierRapscallier@feddit.nl on 30 Oct 2023 11:01 collapse

FLOSS & FOSS

To emphasize that “free software” refers to freedom and not to price, we sometimes write or say “free (libre) software,” adding the French or Spanish word that means free in the sense of freedom. In some contexts, it works to use just “libre software.”

From www.gnu.org/philosophy/floss-and-foss.en.html

They also say:

We in the free software movement don’t use either of these terms, because we don’t want to be neutral on the political question. We stand for freedom, and we show it every time—by saying “free” and “libre”—or “free (libre).”

Lucidlethargy@sh.itjust.works on 30 Oct 2023 17:28 collapse

I don’t care enough but you have to be fucking stupid to run non-FOSS crypto miners

Fixed that for you.

Buffalox@lemmy.world on 29 Oct 2023 11:33 next collapse

According to Kaspersky, StripedFly uses its own custom EternalBlue attack to infiltrate unpatched Windows systems and quietly spread across a victim’s network, including to Linux machines.

Yeah I call bullshit on that. Absolutely zero description of any vulnerability.

Salamendacious@lemmy.world on 29 Oct 2023 11:56 next collapse

This is a different article but you should find at least some more information on how the malware works with Linux here:

bleepingcomputer.com/…/stripedfly-malware-framewo…

I’m not a Linux user so I honestly don’t know if that article is incredibly helpful or not.

Buffalox@lemmy.world on 29 Oct 2023 12:10 next collapse

From the part you quoted earlier, it’s absolutely useless, and not worth reading.

Salamendacious@lemmy.world on 29 Oct 2023 12:11 collapse

That’s fair

girsaysdoom@sh.itjust.works on 29 Oct 2023 12:23 collapse

From what it’s describing, it sounds like it would only impact Linux computers that allow SMB1 access, such as domain-joined systems with samba access allowed. It sounds like this would target mainly enterprise Linux deployments but home Linux setups should be fine for the most part.

Salamendacious@lemmy.world on 29 Oct 2023 12:30 next collapse

Interesting, thanks for that

[deleted] on 29 Oct 2023 12:32 next collapse

.

Salamendacious@lemmy.world on 29 Oct 2023 13:37 collapse

My job still had Windows 95 machines running just a couple years ago. Could there still be Samba1 running out there or does Linux update differently?

[deleted] on 29 Oct 2023 13:39 next collapse

.

Salamendacious@lemmy.world on 29 Oct 2023 13:44 next collapse

Those machines were controlling a conveyor belt system and weren’t online. I was told the software they were running wasn’t available for other OSs. They were locked in a cabinet. That entire conveyor system is now gone so those machines are probably gone too.

[deleted] on 29 Oct 2023 13:49 collapse

.

Salamendacious@lemmy.world on 29 Oct 2023 13:56 collapse

You’re going over my head now but looking at Wikipedia that looks about right. It was controlling machinery based on input from various sensors.

[deleted] on 30 Oct 2023 12:39 collapse

.

lemmyvore@feddit.nl on 29 Oct 2023 14:33 next collapse

Of course there is. Unfortunately the average Linux self-hoster doesn’t have much of a clue and probably runs vulnerable Samba (even if it’s not S1). Of course it doesn’t help that Samba seems to get a vulnerability about once a week. It’s one of the most targeted pieces of network software you could run.

Salamendacious@lemmy.world on 29 Oct 2023 14:36 collapse

I know that Linux is a host of OSs but generally speaking is it up to the user to keep their software up to date or is there some kind of automatic updating process?

lemmyvore@feddit.nl on 29 Oct 2023 16:01 collapse

There are automated updates, especially for security issues, but since Linux users feel they are power users and seldom have to deal with security issues, they often disable updates and do them manually. If and when they remember. And for self-hosted software it’s worst because often they don’t even consider running updates.

SkyeStarfall@lemmy.blahaj.zone on 29 Oct 2023 16:14 next collapse

This depends entirely on the distribution. The distribution I run has no automatic updates by default. I do it manually.

I could easily set it up if I wanted to, but yeah. There is no consensus, it’s just case-by-case basis. Some do have automatic updates by default.

Salamendacious@lemmy.world on 29 Oct 2023 16:22 collapse

Some day I’d like to try Linux. Another commentor on another post was telling me about Clover for old Chromebooks. The amount of variety in Linux can be intimidating.

lemmyvore@feddit.nl on 29 Oct 2023 18:49 collapse

It’s an interesting hobby if you get into it. There are hundreds of variations when you count things like distributions, desktop environments and so on, but there’s only a few core mainstream “families” where you get down to it. For something like an old Chromebook it’s basically decided for you since there’s only specific variants made for it.

Salamendacious@lemmy.world on 29 Oct 2023 18:53 next collapse

Unfortunately I don’t have a lot of hardware to even put Linux on. Talking with the users on the other post piqued my curiosity a little. We’ll see. Thanks for clearing some stuff up for me.

[deleted] on 30 Oct 2023 11:18 collapse

.

[deleted] on 30 Oct 2023 10:28 collapse

.

lemmyvore@feddit.nl on 30 Oct 2023 11:11 collapse

Oh I just mean from the point of view of someone who’s never tried it before. Lots of people arrive at Linux through indirect fields (pc building, self-hosting, gaming etc.) If it somehow turns into a career down the road all the better.

micka190@lemmy.world on 29 Oct 2023 15:53 next collapse

The bank I work at still has core systems running Lotus 🙃

Salamendacious@lemmy.world on 29 Oct 2023 16:04 collapse

Lotus 123 was outdated when I was still a kid. That’s impressive.

Toes@ani.social on 29 Oct 2023 17:00 collapse

Yeah windows 2000 assembly robots, too expensive to replace and too critical to not keep alive.

Salamendacious@lemmy.world on 29 Oct 2023 17:10 collapse

Well those were controlling a conveyor belt system that maintenance told me they bought used in the 90s.

Eyron@lemmy.world on 29 Oct 2023 12:59 collapse

They describe an SSH infector, as well as a credentials scanner. To me, that sounds like it started like from exploited/infected Windows computers with SSH access, and then continued from there.

With how many unencrypted SSH keys there are, how most hosts keep a list of the servers they SSH into, and how they can probably bypass some firewall protections once they’re inside the network: not a bad idea.

Salamendacious@lemmy.world on 29 Oct 2023 13:33 collapse

I think the original article talked about “spreading” to Linux machines so that generally tracks with what you’re saying that it starts on a Windows machine that itself has access to a Linux machine.

tja@sh.itjust.works on 29 Oct 2023 16:00 next collapse

I don’t know why op did not want to share the original report, but it is linked in the article: securelist.com/…/110903/

Socsa@sh.itjust.works on 29 Oct 2023 17:10 collapse

I too am struggling to find the actual Linux vuln. It sounds like it steals ssh keys, so maybe just poorly configured hosts?

Buffalox@lemmy.world on 29 Oct 2023 18:19 next collapse

You should always have a file your home folder named SSH keys and Root password. /s
That’s not just poor configuration, that’s complete disregard for security.

[deleted] on 29 Oct 2023 20:04 collapse

.

mojo@lemm.ee on 29 Oct 2023 15:55 next collapse

Malware disguised as malware? Interesting

Salamendacious@lemmy.world on 29 Oct 2023 16:05 next collapse

It’s like inception

edgemaster72@lemmy.world on 29 Oct 2023 16:44 next collapse

It’s just malware all the way down

Salamendacious@lemmy.world on 29 Oct 2023 17:15 collapse

Malware turtles?

edgemaster72@lemmy.world on 29 Oct 2023 17:19 collapse

A disc of malware resting on top of 4 malware elephants, riding a giant malware turtle

Salamendacious@lemmy.world on 29 Oct 2023 17:25 collapse

Morris balanced on Michelangelo standing on the shoulders of ILOVEYOU holding stuxnet giving HeartBleed

MargotRobbie@lemm.ee on 29 Oct 2023 19:54 collapse

It’s always the one you least suspect, like disguising yourself as an impersonation of yourself. <img alt="" src="https://media0.giphy.com/media/xE711OdbdKQ80/giphy.webp">

Immersive_Matthew@sh.itjust.works on 30 Oct 2023 17:38 collapse

Why would the article not share the name of the miner in question?

affiliate@lemmy.world on 30 Oct 2023 18:41 collapse

magician never reveals his secrets