FBI and NSA expose new Linux malware

Tutman

Level 12
Thread author
Verified
Top Poster
Well-known
Apr 17, 2020
531
3,532
1,069
USA
FBI and NSA expose new Linux malware Drovorub, used by Russian state hackers
The FBI and NSA issue joint security alert containing technical details about new Linux malware developed by Russia's military hackers.

The FBI and NSA have published today a joint security alert containing details about a new strain of Linux malware that the two agencies say was developed and deployed in real-world attacks by Russia's military hackers.

The two agencies say Russian hackers used the malware, named Drovorub, was to plant backdoors inside hacked networks.

Based on evidence the two agencies have collected, FBI and NSA officials claim the malware is the work of APT28 (Fancy Bear, Sednit), a codename given to the hackers operating out of military unity 26165 of the Russian General Staff Main Intelligence Directorate (GRU) 85th Main SpecialService Center (GTsSS).

Through their joint alert, the two agencies hope to raise awareness in the US private and public sectors so IT administrators can quickly deploy detection rules and prevention measures.
 
There's still a dangerous assumption among many that malware is only a problem for Windows. That might have been more believable a decade or two ago. But the reality is that any computer system that builds up significant market share or plays host to valuable data will now be a target. Linux is increasingly the foundation of many different business systems and vast parts of the cloud. While there are still relatively few threats targeting Linux, there's no reason why that should remain the case.

None of this is to question the quality of Linux's in-built security, which many argue is stronger because of the open-source nature of the code. Indeed, in this case, the malware only works against relatively old versions of the Linux kernel. But Drovorub is a reminder that hackers and malware writers are increasingly willing to target any and all systems if they think there is a profit, some other advantage – or simply the opportunity for chaos – to be had.

The most dangerous assumption that many organisations make is that they are not going to be a target. That might be because they think they are too insignificant or because they are too well protected.

Both of those assumptions are likely to be wrong. Even if your business is modest or niche, you may have customers or suppliers who are more interesting to hackers, who will therefore use your systems as a route to attack them. And what about if you think you are too well defended to be a victim? Well, there are plenty of billion-dollar companies that thought the same – and were wrong.

This latest revelations show that all systems and all devices can, and probably will, be targeted, even the ones we least expect. Innovations like the IoT and the cloud simply broaden the threat surface organisations will have to secure. And hackers will not abide by old-fashioned ideas about what software and systems are vulnerable to attack. Complacency is our biggest threat.
 
I never see people on a Linux forum asking for help with a malware infection or even a possible malware infection. This just doesn't seem to be happening to home users of Linux. Obviously, it could happen, but it just seems so rare.
 
Probably because most linux users are tech savvy.
True. And since they don't use AV, they may never even know if they are infected. But still, the glaring lack of posts about malware incidents tells me they are not very common.
 
I would say that a lot even doesn't know they're infected
To tell you the truth, I don't think I could even get infected on linux if I tried.
On Windows, it's easy: turn off AV, download warez, click on suspicious links. It won't take long until you are infected. On linux, I have no idea how to get infected.
 
Finding Linux malware are silly easy. Sample sources are flooded with them on almost a daily base.

Admit that one got infected is embarrassing for anyone and extra so for those with a little more knowledge than average people. This is sadly a well known issue as it's very important with reports and information so vendors can tackle attacks faster and more effective.
 
Last edited:
To tell you the truth, I don't think I could even get infected on linux if I tried.
On Windows, it's easy: turn off AV, download warez, click on suspicious links. It won't take long until you are infected. On linux, I have no idea how to get infected.
I agree with you. Avoiding illegal sites, downloads one can even almost completely avoid malware infection on windows so on Linux the possibility is almost zero for sane users. Nowadays adblockers are far more important than antivirus on any operating system. Malvertising is a serious threat now.
 
Where does a user find linux malware, besides by downloading malware samples as a tester?
VT, Hybrid Analysis, etc etc. Backtracking IOCs and sources also from all the Linux malware articles usually helps.

Click the spoiler button, if curious as these are just a very small portion of reported Linux malware here on MT alone.
 
VT, Hybrid Analysis, etc etc. Backtracking IOCs and sources also from all the Linux malware articles usually helps.

Click the spoiler button, if curious as these are just a very small portion of reported Linux malware here on MT alone.
I have been following the reports you listed in the spoiler. It almost always is targeting servers, rather than home users. There was a report or two about linux malware hosted on github, though. If a user was unlucky enough to end up on a github page hosting fake versions of popular linux apps, then indeed, that's a way to get infected.
 

You may also like...