Jump to content

Ransomware reaches Linux

GoodBytes

Ransomware are a type of malware which locked you out of access your important data in your system, usually by using a strong encryption, and asking you monetary funds to be paid in a way that can't be easily traced to someone with the program which holds the generated decryption key. If you pay, your data is hopefully decrypted. If you don't or close the program, the decryption key is gone, and your data will remain encrypted.

 

Ransomware have been gaining huge traction with criminals as they can't be detected by anti-malware, it is easy to make (has a lot of variations), does maximum damage to the user if they don't pay, and don't have a backup (which most people, even companies don't), and due to the value of the data being encrypted, most people pay, bringing them millions of dollars. For example, CryptoLocker is estimate to have brought 3 million dollars U.S to the criminals, before it was taken down by authorities. Cryptowall (another variation), brought 18 million dollars as of June 2015, and increasing

 

The big appeal for ransomware are companies, as they can pay more easily large sum of money to pay the ransom in order to they their data back.

 

Due to the great number of Linux based OS servers, Linux is starting to get traction to criminals.

Now, Linux, who was thought to be a safe heaven against attacks due to low marketshare, is being attacked according to ArsTechnica.

 

Encoder-640x293.png

 

They claim that the The anti-virus software company Doctor Web discover a ransomware dubbed: "Linux.Encoder.1" by the company, which targets web servers, seeking SQL databases, by specifically looking for Apache or Nginx installations and MySQL, and takes action. Many of the systems that have been affected by the malware were infected via a vulnerability in the Magento CMS.The good news, is that Magento released a security update patching the vulnerability October 31st.

 

Many of the systems that have been affected by the malware were infected when attackers exploited a vulnerability in the Magento CMS. A critical vulnerability patch for Magneto, which is used to power a number of e-commerce sites, was published on October 31. Doctor Web researchers currently place the number of victims in the "at least tens" range, but attacks on other vulnerable content management systems could increase the number of victims dramatically.

 

In order to run the malware, it needs to be execute  as administrator, while it seams like a non issue, systems where infected. We don't know if the malware was able to get through, or due to the poor/incorrect setup of the server.

 


n order to run, the malware has to be executed with administrator-level privileges. Using 128-bit AES crypto, the malware encrypts the contents of all users' home directories and any files associated with websites running on the systems. It then goes through the whole directory structure of mounted volumes, encrypting a variety of file types. In each directory it encrypts, it drops a text file called README_FOR_DECRYPT.txt. This demands payment and provides a link to a Tor "hidden service" site via a Tor gateway.

 

Source: http://arstechnica.com/security/2015/11/new-encryption-ransomware-targets-linux-systems/

 

Now the question is, will company affected be aware of the patch?, and will they apply the update?

Also, while this is potentially first attack (at least found), it does show that Linux based OS isn't a safe heaven from such attack. It is only a question of time before Linux based OS attacks grows.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Scary stuff :c

My Rigs:

Gaming/CAD/Rendering Rig
Case:
 Corsair Air 240 , CPU: i7-4790K, Mobo: ASUS Gryphon Z97 mATX,  GPU: Gigabyte G1 Gaming GTX 970, RAM: G.Skill Sniper 16GB, SSD: SAMSUNG 1TB 840 EVO, Cooling: Corsair H80i PCPP: https://au.pcpartpicker.com/b/f2TH99SFF HTPC
Case:
Silverstone ML06B, CPU: Pentium G3258, Mobo: Gigabyte GA-H97N-WiFi, RAM: G.Skill 4GB, SSD: Kingston SSDNow 120GB PCPP: https://au.pcpartpicker.com/b/JmZ8TW
Link to comment
Share on other sites

Link to post
Share on other sites

"In order to run the malware, it needs to be execute  as administrator, " - Administrator says denied lol.

Malware can get around anything.

"It pays to keep an open mind, but not so open your brain falls out." - Carl Sagan.

"I can explain it to you, but I can't understand it for you" - Edward I. Koch

Link to comment
Share on other sites

Link to post
Share on other sites

Poor Linux Elitists.. Now they can't spout "BUT IT CAN'T GET VIRUSES!1!!!11!"

 

It was bound to happen.

Knowledgeable linux users don't say that, linux is just less virus-prone, and that is still the case even after the ransomware

Link to comment
Share on other sites

Link to post
Share on other sites

Give it a week, more than likely Red Hat or Debian have a fix, they have some extremely talented devs and hackers in their ranks, but of course security is an ever evolving planet.

Thing is people think distros are more secure than Windows OOB, which can be true it depends on the user, Windows can be made to be harder than Linux, vice versa, all about the user :)

Don't worry, least we have more chance of survival than most Windows users :P

What does an Transformer get? Life insurance or car insurance? - Russell Howard - Standup (Made me giggle a bit)

Link to comment
Share on other sites

Link to post
Share on other sites

"In order to run the malware, it needs to be execute  as administrator, " - Administrator says denied lol.

Thus is true for OSX and Windows. I mean really... At least the average Linux user is less idiotic than the average pc user in general so ofc they are less susceptible to stupid.

LINK-> Kurald Galain:  The Night Eternal 

Top 5820k, 980ti SLI Build in the World*

CPU: i7-5820k // GPU: SLI MSI 980ti Gaming 6G // Cooling: Full Custom WC //  Mobo: ASUS X99 Sabertooth // Ram: 32GB Crucial Ballistic Sport // Boot SSD: Samsung 850 EVO 500GB

Mass SSD: Crucial M500 960GB  // PSU: EVGA Supernova 850G2 // Case: Fractal Design Define S Windowed // OS: Windows 10 // Mouse: Razer Naga Chroma // Keyboard: Corsair k70 Cherry MX Reds

Headset: Senn RS185 // Monitor: ASUS PG348Q // Devices: Note 10+ - Surface Book 2 15"

LINK-> Ainulindale: Music of the Ainur 

Prosumer DYI FreeNAS

CPU: Xeon E3-1231v3  // Cooling: Noctua L9x65 //  Mobo: AsRock E3C224D2I // Ram: 16GB Kingston ECC DDR3-1333

HDDs: 4x HGST Deskstar NAS 3TB  // PSU: EVGA 650GQ // Case: Fractal Design Node 304 // OS: FreeNAS

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Well it's a good thing I use good passwords and don't hand out root access to evey program I run.

​Also check out firejail. It's a program that puts other programs in sandboxes.

​There's also QubesOS, which runs every program in a VM. That approach might not be practical to some though.

​Remember, just because GNU/Linux has a virus doesn't mean it's insecure.

​Also got to love the Windows guys here saying that Windows is somehow awesome because of this or that it's somehow more secure than GNU/Linux. Good way to make me laugh.

Link to comment
Share on other sites

Link to post
Share on other sites

Poor Linux Elitists.. Now they can't spout "BUT IT CAN'T GET VIRUSES!1!!!11!"

 

It was bound to happen.

reminds me of everyone that use to say that about apple

Link to comment
Share on other sites

Link to post
Share on other sites

Remember, just because GNU/Linux has a virus doesn't mean it's insecure.

But it also means it's just as susceptible as any other OS and its lack of market share is the only thing protecting it.

"It pays to keep an open mind, but not so open your brain falls out." - Carl Sagan.

"I can explain it to you, but I can't understand it for you" - Edward I. Koch

Link to comment
Share on other sites

Link to post
Share on other sites

But it also means it's just as susceptible as any other OS and its lack of market share is the only thing protecting it.

That and the general design of UNIX/UNIX-like OSs in general. The permissions system alone along with limited user access (you can disable access to sudo on accounts completely) means it is more secure than Windows by design.

​This applies to Mac OS X as well, since it is based on FreeBSD.

​Not to mention the fact that bugs are resolved much faster on GNU/Linux due to the nature of libre (open source) software. Remember Heartbleed? A bugfix was released right away. With Windows, you'd be lucky if a bugfix was released with the next version unless Microsoft gets a ton of bad PR that is.

Link to comment
Share on other sites

Link to post
Share on other sites

Server admin just shrugs, wipes the drive, and restores from a backup.

Workstation:  13700k @ 5.5Ghz || Gigabyte Z790 Ultra || MSI Gaming Trio 4090 Shunt || TeamGroup DDR5-7800 @ 7000 || Corsair AX1500i@240V || whole-house loop.

LANRig/GuestGamingBox: 9900nonK || Gigabyte Z390 Master || ASUS TUF 3090 650W shunt || Corsair SF600 || CPU+GPU watercooled 280 rad pull only || whole-house loop.

Server Router (Untangle): 13600k @ Stock || ASRock Z690 ITX || All 10Gbe || 2x8GB 3200 || PicoPSU 150W 24pin + AX1200i on CPU|| whole-house loop

Server Compute/Storage: 10850K @ 5.1Ghz || Gigabyte Z490 Ultra || EVGA FTW3 3090 1000W || LSI 9280i-24 port || 4TB Samsung 860 Evo, 5x10TB Seagate Enterprise Raid 6, 4x8TB Seagate Archive Backup ||  whole-house loop.

Laptop: HP Elitebook 840 G8 (Intel 1185G7) + 3080Ti Thunderbolt Dock, Razer Blade Stealth 13" 2017 (Intel 8550U)

Link to comment
Share on other sites

Link to post
Share on other sites

Poor Linux Elitists.. Now they can't spout "BUT IT CAN'T GET VIRUSES!1!!!11!"

 

It was bound to happen.

 

This isn't a virus. But actually we've had malware on Linux for a while if you count Android. Unlike Android however, Linux can be easily patched, often on the fly without fully restarting a server.

-------

Current Rig

-------

Link to comment
Share on other sites

Link to post
Share on other sites

This is why you keep backups as you can just dump everything on that drive if you stored a backup and will only be mildly annoyed in comparison to screwed

https://linustechtips.com/main/topic/631048-psu-tier-list-updated/ Tier Breakdown (My understanding)--1 Godly, 2 Great, 3 Good, 4 Average, 5 Meh, 6 Bad, 7 Awful

 

Link to comment
Share on other sites

Link to post
Share on other sites

"In order to run the malware, it needs to be execute  as administrator, " - Administrator says denied lol.

 

Why GNU/Linux Viruses are fairly uncommon” from Charlie Harvey

evilmalware 0.6 (beta)

Copyright 2000, 2001, 2003, 2005 E\/17 |-|4><0|2z Software Foundation, Inc.

This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY, COMPLETE DESTRUCTION OF IMPORTANT DATA or FITNESS FOR A PARTICULAR PURPOSE (eg. sending thousands of Viagra spams to people accross the world).

Basic Installation

Before attempting to compile this virus make sure you have the correct version of glibc installed, and that your firewall rules are set to ‘allow everything’.

  1. Put the attachment into the appropriate directory eg. /usr/src.
  2. Type ‘tar xvzf evilmalware.tar.gz’ to extract the source files for this virus.
  3. ‘cd’ to the directory containing the virus' source code and type ‘./configure’ to configure the virus for your system. If you're using ‘csh’ on an old version of System V, you might need to type ‘sh ./configure’ instead to prevent ‘csh’ from trying to execute ‘configure’ itself.
  4. Type ‘make’ to compile the package. You may need to be logged in as root to do this.
  5. Optionally, type ‘make check_payable’ to run any self-tests that come with the virus, and send a large donation to an unnumbered Swiss bank account.
  6. Type ‘make install’ to install the virus and any spyware, trojans pornography, penis enlargement adverts and DDoS attacks that come with it.
  7. You may now configure your preferred malware behaviour in /etc/evilmalware.conf.
SEE ALSO evilmalware(1)evilmalware.conf(5)please_delete_all_my_files(1)

Other humor in the GNU Humor Collection.

Link to comment
Share on other sites

Link to post
Share on other sites

This makes me chuckle a bit when I think of the Linux fanboys bashing Windows 10 citing security as their number one reason. That said, an external HDD is considerably cheaper than forking over hundreds of thousads to some nerd caked in Dorito crumbs.

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

welp

there goes the excuse of linux being safer than windows

well it still is. and untill linux reaches that 51% market share it will continue to be. (sort of)

issue is the people who think linux is just this ''invulnerable OS that cant get infected'' or the people who use this kind of article to say that linux is bad. :/

 

i was actually expecting something big like this before christmas. although i has not guessed it to be ransomware.

Watch out for each other. Love everyone and forgive everyone, including yourself. Forgive your anger, forgive your guilt. Your shame. Your sadness. Embrace and open up your love, your joy, your truth, and most especially your heart. 
-Jim Hensen

Link to comment
Share on other sites

Link to post
Share on other sites

 

 

In order to run the malware, it needs to be executed as administrator

When you execute a sketchy program as administrator, then it stops being a virus. It is pure stupidity.

/thread

MacBook Pro 15' 2018 (Pretty much the only system I use)

Link to comment
Share on other sites

Link to post
Share on other sites

When you execute a sketchy program as administrator, then it stops being a virus. It is pure stupidity.

/thread

And yes it managed to infect many systems.

Also, it is not a  virus, it is a malware.

 

It exploited Magento CMS vulnerability, which allowed the malware to not only inject itself, but be ran by Magento CMS as administrator on the system. That is how it gain admin access.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×