this post was submitted on 25 Aug 2024
101 points (94.7% liked)

Technology

58115 readers
4389 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 6 comments
sorted by: hot top controversial new old
[–] [email protected] 44 points 3 weeks ago

Sure, once you have root on the host system you can pretty much do whatever you want ... adding entries to udev isn't anything revolutionary.

[–] [email protected] 17 points 3 weeks ago* (last edited 3 weeks ago)

"At the time of this writing, the persistence technique used (udev rules) is not documented by MITRE ATT&CK," the researchers note, highlighting that sedexp is an advanced threat that hides in plain site.

These rules contain three parameters that specify its applicability (ACTION== "add"), the device name (KERNEL== "sdb1"), and what script to run when the specified conditions are met (RUN+="/path/to/script").

[–] [email protected] 15 points 3 weeks ago (1 children)

"Malware"? Fucking cybersec press is the worst.

What's next, they're gonna call "sudo" a 0-day vuln?

[–] [email protected] 2 points 3 weeks ago* (last edited 3 weeks ago) (1 children)
[–] [email protected] 3 points 3 weeks ago (1 children)

Sure, but this isn't a privilege escalation, this requires privilege escalation, and it merely installs a backdoor that preserves that privilege.

It's like installing something in cron or systemd, it's not a vulnerability in itself, but it can allow an attacker to add a backdoor once they exploit a vulnerability once.

[–] [email protected] 1 points 3 weeks ago

Ah fine, that was the first result in google, i didn't read it enough. But there were some privilege escalations in sudo and lots more of misconfiguration. https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=sudo