New worm targets Linux systems
sprkymrk
Member Posts: 4,884 ■■■□□□□□□□
New worm targets Linux systems
This worm attacks web server software installed on Linux systems. McAfee assigns it "low risk" and Symantec "medium risk". The interesting thing to me is two-fold. First, since most linux users do NOT run AV software, how will they know they are infected? Second, it's not "really" attacking anything to do with the linux kernel, but rather third-party linux software. This is becoming true with almost all newer exploits and malware. Rather than target the OS (whether Windows, *nix, etc.) it is third party apps that run on these platforms that are targeted.
Reasons? In my research:
1. Both Windows and Linux have automatic updating measures to quickly roll out patches for OS based vulnerabilities. While some third party apps also have this feature, it is less often used or enabled. Additionally, unlike Windows Updates or Up2Date, there is rarely an Enterprise level way to update such apps (okay - SMS comes to mind).
2. Third party applications rarely go through the now rigorous Quality Assurance & Testing that OS's do, and therefore can be more easily exploited.
This worm attacks web server software installed on Linux systems. McAfee assigns it "low risk" and Symantec "medium risk". The interesting thing to me is two-fold. First, since most linux users do NOT run AV software, how will they know they are infected? Second, it's not "really" attacking anything to do with the linux kernel, but rather third-party linux software. This is becoming true with almost all newer exploits and malware. Rather than target the OS (whether Windows, *nix, etc.) it is third party apps that run on these platforms that are targeted.
Reasons? In my research:
1. Both Windows and Linux have automatic updating measures to quickly roll out patches for OS based vulnerabilities. While some third party apps also have this feature, it is less often used or enabled. Additionally, unlike Windows Updates or Up2Date, there is rarely an Enterprise level way to update such apps (okay - SMS comes to mind).
2. Third party applications rarely go through the now rigorous Quality Assurance & Testing that OS's do, and therefore can be more easily exploited.
All things are possible, only believe.
Comments
-
JDMurray Admin Posts: 13,090 Adminsprkymrk wrote:2. Third party applications rarely go through the now rigorous Quality Assurance & Testing that OS's do, and therefore can be more easily exploited.
And I'm really sick of people saying that Open Source software is safer because the source code is available to be reviewed for back doors and malicious operation. Does the typical user of Open Source software really do that? Or are they more likely to just install, configure, and use the package without every looking at the source code? And how many people have the tools and experiences to conduct static and dynamic software security code analysis? Please point me to an organization whose charter is to specifically perform vulnerability assessments on Open Source software packages, because I want to work for them! -
keatron Member Posts: 1,213 ■■■■■■□□□□JDMurray wrote:sprkymrk wrote:2. Third party applications rarely go through the now rigorous Quality Assurance & Testing that OS's do, and therefore can be more easily exploited.
And I'm really sick of people saying that Open Source software is safer because the source code is available to be reviewed for back doors and malicious operation. Does the typical user of Open Source software really do that? Or are they more likely to just install, configure, and use the package without every looking at the source code? And how many people have the tools and experiences to conduct static and dynamic software security code analysis? Please point me to an organization whose charter is to specifically perform vulnerability assessments on Open Source software packages, because I want to work for them!
My friend, you catch the very essence of a sermon I've been preaching for 6 years. And you are right on!! 99% of all vulnerability research and discovery I've done this year has been open source distros and Solaris. And quiet frankly, it's not pretty. -
Slowhand Mod Posts: 5,161 ModJDMurray wrote:And I'm really sick of people saying that Open Source software is safer because the source code is available to be reviewed for back doors and malicious operation. Does the typical user of Open Source software really do that? Or are they more likely to just install, configure, and use the package without every looking at the source code? And how many people have the tools and experiences to conduct static and dynamic software security code analysis? Please point me to an organization whose charter is to specifically perform vulnerability assessments on Open Source software packages, because I want to work for them!
I'll second that notion. It's the same song I've heard in almost all my years of IT work, "I use Linux, so I'm secure". Blanket statements like these are the real killers, because it lulls people into believing the rhetoric. I've yet to work with anyone that actually digs into the source code for the applications they use, test out the software, and report back security holes or performance flaws. I hear things like "Windows isn't secure", "Firefox can't be used to infect computers with viruses/worms/etc.", and the worst of all, one I heard while working with Apple salesmen, "Macintosh computers don't get viruses, and they can't be hacked". At this point, I've given up trying to argue the facts with most people, trying to tell them that any system can be compromised, all software needs to be updated, and that there is more to being secure than what operating system you use. The topic of third-party apps always comes up in these discussions, and most people I talk to dismiss the idea of using something like iTunes or FireFox to infect or compromise a computer. Ironically, though, they have no trouble accepting that Microsoft Office is vurnerable, simply because it's a Microsoft product. And, because a piece of software like FireFox, for example, isn't made my Microsoft, it's assumed to be "secure".
Free Microsoft Training: Microsoft Learn
Free PowerShell Resources: Top PowerShell Blogs
Free DevOps/Azure Resources: Visual Studio Dev Essentials
Let it never be said that I didn't do the very least I could do.