• minfapper@piefed.social
    link
    fedilink
    English
    arrow-up
    149
    arrow-down
    1
    ·
    24 days ago

    Unfortunately, it’s only a matter of time until native Linux malware becomes more rampant

    • fartsparkles@lemmy.world
      link
      fedilink
      arrow-up
      31
      ·
      24 days ago

      It already is pretty rampant, however most Linux admins have minimal if any detection strategy.

      Additionally, while there’s plenty of binaries about like VoidLink, almost all campaigns against Linux hosts target SSH, or RCE vulnerabilities, and deliver shell scripts that orchestrate the attack.

      Why compile a binary when the shell has everything you need? The threat models are pretty different between Windows and the *nix world.

      When you look at botnet composition, they’re usually made up of outdated Linux hosts with SSH open with password-based authentication.

      Seriously people, switch to key-based auth and disable password auth entirely.

    • mlg@lemmy.world
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      1
      ·
      24 days ago

      I forgot but do browsers download binaries as executable?

      One of the big issues with windows is the fact that it uses file extensions for determining file type, so EXEs can just be instantly run after downloading, which led to MSFT making the “Mark Of Th Web” attribute, which moved hackers into finding every type of bypass for MOTW.

      I think straight bin downloads require you to chmod +x first, but you could also probably bypass it with any archive format like .tar.gz or opting for a .deb or .rpm.

      The upside is that you really shouldn’t be downloading raw bins outside of the package manager, but there are a bunch of tools that only ship as appimages, so you’re kinda screwed if you download and execute from an untrusted source.

    • Galactose@sopuli.xyz
      link
      fedilink
      arrow-up
      6
      ·
      24 days ago

      Reminder, that once a vulnerability is found, it disappears, FOREVERRRRRR

      You don’t get that with windows.

    • oce 🐆@jlai.lu
      link
      fedilink
      arrow-up
      6
      ·
      24 days ago

      Isn’t it already the case to steal from companies? I don’t know if things like Shai Hulud 2.0 qualifies as malware. Companies are much more lucrative targets so I am not sure personal Linux is changing much.

    • Rothe@piefed.social
      link
      fedilink
      English
      arrow-up
      5
      ·
      24 days ago

      That is indeed one of the unfortunate but inevitable results of the OS becoming more popular.