Results 1 to 5 of 5

Thread: In the News

  1. #1
    Join Date
    Jul 2010
    Location
    Philadelphia, PA
    Beans
    94
    Distro
    Ubuntu 12.04 Precise Pangolin

    Exclamation In the News

    Hello All,

    So I was just reading the news and noticed there is a piece of malware going around in S. Korea called 'Jokra' which erases Linux partitions. I was wondering would it be possible for Ubuntu users to get this malware without running Root.

    Thanks,

    John

  2. #2
    Join Date
    Nov 2007
    Location
    London, England
    Beans
    7,703

    Re: In the News

    According to this:
    http://www.symantec.com/connect/blog...n-cyber-attack
    the malware resides on a windows box, and watches for anyone making ssh connections from the windows box to a linux box. Then if it can (if the ssh connection logged in as root) then it wipes the /kernel, /usr, /etc, and /home directories.

    Conclusion - don't ssh from windows boxes into linux boxes as root, especially not using mRemote. It's the windows box that you can't trust. Actually, I thought I read somewhere else that it also forwards the ssh login credentials to a server somewhere on the internet (presumably for later use by the baddies). So even using non-root ssh from a windows box is not safe.

    Edit:
    Two afterthoughts:
    Firstly, this malware is remarkably dumb. If it can hijack root ssh connections like that, it would be much smarter to drop proper malware such as a backdoor than to simply wipe the target machine.
    Secondly, Ubuntu is more vulnerable than most other linux's in that even if the user doesn't log in as root, the same password that's used in the ssh credentials can probably be used again with sudo to gain root. Most other linux distros would require a different password to gain root, although the malware could still do keyboard logging to find it.
    Last edited by The Cog; March 23rd, 2013 at 02:11 PM.

  3. #3
    Join Date
    Jul 2010
    Location
    Philadelphia, PA
    Beans
    94
    Distro
    Ubuntu 12.04 Precise Pangolin

    Re: In the News

    Ah, thank you for clearing that up for me!

  4. #4
    Join Date
    Jan 2012
    Beans
    753

    Re: In the News

    Quote Originally Posted by The Cog View Post
    According to this:
    http://www.symantec.com/connect/blog...n-cyber-attack
    the malware resides on a windows box, and watches for anyone making ssh connections from the windows box to a linux box. Then if it can (if the ssh connection logged in as root) then it wipes the /kernel, /usr, /etc, and /home directories.

    Conclusion - don't ssh from windows boxes into linux boxes as root, especially not using mRemote. It's the windows box that you can't trust. Actually, I thought I read somewhere else that it also forwards the ssh login credentials to a server somewhere on the internet (presumably for later use by the baddies). So even using non-root ssh from a windows box is not safe.

    Edit:
    Two afterthoughts:
    Firstly, this malware is remarkably dumb. If it can hijack root ssh connections like that, it would be much smarter to drop proper malware such as a backdoor than to simply wipe the target machine.
    Secondly, Ubuntu is more vulnerable than most other linux's in that even if the user doesn't log in as root, the same password that's used in the ssh credentials can probably be used again with sudo to gain root. Most other linux distros would require a different password to gain root, although the malware could still do keyboard logging to find it.
    The malware wasn't dumb. It's purpose was to disable the SK broadcasting (or something like that), not to set a backdoor.

  5. #5
    Join Date
    Oct 2012
    Beans
    55

    Re: In the News

    It also appears from one of the avast blogs that for the Windows host exploit to succeed DEP had to be disabled on the target machines.

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •