• chevron_right

      Linux devices are under attack by a never-before-seen worm

      news.movim.eu / ArsTechnica · Wednesday, 10 January - 16:12 · 1 minute

    Linux devices are under attack by a never-before-seen worm

    Enlarge (credit: Getty Images)

    For the past year, previously unknown self-replicating malware has been compromising Linux devices around the world and installing cryptomining malware that takes unusual steps to conceal its inner workings, researchers said.

    The worm is a customized version of Mirai, the botnet malware that infects Linux-based servers, routers, Web cameras, and other so-called Internet-of-things devices. Mirai came to light in 2016 when it was used to deliver record-setting distributed denial-of-service attacks that paralyzed key parts of the Internet that year. The creators soon released the underlying source code, a move that allowed a wide array of crime groups from around the world to incorporate Mirai into their own attack campaigns. Once taking hold of a Linux device, Mirai uses it as a platform to infect other vulnerable devices, a design that makes it a worm, meaning it self-replicates.

    Dime-a-dozen malware with a twist

    Traditionally, Mirai and its many variants have spread when one infected device scans the Internet looking for other devices that accept Telnet connections . The infected devices then attempt to crack the telnet password by guessing default and commonly used credential pairs. When successful, the newly infected devices target additional devices, using the same technique. Mirai has primarily been used to wage DDoSes. Given the large amounts of bandwidth available to many such devices, the floods of junk traffic are often huge, giving the botnet as a whole tremendous power.

    Read 11 remaining paragraphs | Comments

    • chevron_right

      Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet

      news.movim.eu / ArsTechnica · Wednesday, 22 November - 19:35 · 1 minute

    A stylized human skull over a wall of binary code.

    Enlarge (credit: Aurich Lawson / Ars Technica )

    Miscreants are actively exploiting two new zero-day vulnerabilities to wrangle routers and video recorders into a hostile botnet used in distributed denial-of-service attacks, researchers from networking firm Akamai said Thursday.

    Both of the vulnerabilities, which were previously unknown to their manufacturers and to the security research community at large, allow for the remote execution of malicious code when the affected devices use default administrative credentials, according to an Akamai post . Unknown attackers have been exploiting the zero-days to compromise the devices so they can be infected with Mirai, a potent piece of open source software that makes routers, cameras, and other types of Internet of Things devices part of a botnet that’s capable of waging DDoSes of previously unimaginable sizes.

    Akamai researchers said one of the zero-days under attack resides in one or more models of network video recorders. The other zero-day resides in an “outlet-based wireless LAN router built for hotels and residential applications.” The router is sold by a Japan-based manufacturer, which “produces multiple switches and routers.” The router feature being exploited is “a very common one,” and the researchers can’t rule out the possibility it’s being exploited in multiple router models sold by the manufacturer.

    Read 16 remaining paragraphs | Comments

    • Li chevron_right

      Virus Mirai dans Ventoy

      DeVeDe · pubsub.eckmul.net / linuxfr · Saturday, 19 December, 2020 - 12:35

    <p>Apparemment, le Trojan Mirai qui cible les systèmes Linux est présent dans plusieurs fichiers de Ventoy, une application qui permet de créer une clé USB pour démarrer plusieurs distributions Linux.<br> <a href="https://github.com/ventoy/Ventoy/issues/660">https://github.com/ventoy/Ventoy/issues/660</a></p> <p>Tous les fichiers infectés ont été ajoutés au dépôt par l'auteur du projet "longpanda" et non par des contributeurs. En attendant sa réponse, je conseille d'utiliser plutôt la clé USB MultiSystem : <a href="http://liveusb.info/dotclear/">http://liveusb.info/dotclear/</a></p> <div><a href="https://linuxfr.org/users/devede/journaux/virus-mirai-dans-ventoy.epub">Télécharger ce contenu au format EPUB</a></div> <p> <strong>Commentaires :</strong> <a href="//linuxfr.org/nodes/122661/comments.atom">voir le flux Atom</a> <a href="https://linuxfr.org/users/devede/journaux/virus-mirai-dans-ventoy#comments">ouvrir dans le navigateur</a> </p>