this post was submitted on 29 Oct 2023
275 points (93.9% liked)

Technology

59148 readers
2006 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Antivirus provider Kaspersky uncovers a sophisticated piece of 'StripedFly' malware camouflaged as a cryptocurrency miner that's been targeting PCs for more than five years.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 17 points 1 year ago (2 children)

This is a different article but you should find at least some more information on how the malware works with Linux here:

https://www.bleepingcomputer.com/news/security/stripedfly-malware-framework-infects-1-million-windows-linux-hosts/

I'm not a Linux user so I honestly don't know if that article is incredibly helpful or not.

[–] [email protected] 19 points 1 year ago* (last edited 1 year ago) (3 children)

From what it's describing, it sounds like it would only impact Linux computers that allow SMB1 access, such as domain-joined systems with samba access allowed. It sounds like this would target mainly enterprise Linux deployments but home Linux setups should be fine for the most part.

[–] [email protected] 11 points 1 year ago (1 children)

They describe an SSH infector, as well as a credentials scanner. To me, that sounds like it started like from exploited/infected Windows computers with SSH access, and then continued from there.

With how many unencrypted SSH keys there are, how most hosts keep a list of the servers they SSH into, and how they can probably bypass some firewall protections once they're inside the network: not a bad idea.

[–] [email protected] 6 points 1 year ago

I think the original article talked about "spreading" to Linux machines so that generally tracks with what you're saying that it starts on a Windows machine that itself has access to a Linux machine.

[–] [email protected] 1 points 1 year ago

Interesting, thanks for that

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago) (1 children)

From the part you quoted earlier, it's absolutely useless, and not worth reading.

[–] [email protected] 2 points 1 year ago