this post was submitted on 29 Oct 2023
275 points (93.9% liked)

Technology

58164 readers
3999 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Antivirus provider Kaspersky uncovers a sophisticated piece of 'StripedFly' malware camouflaged as a cryptocurrency miner that's been targeting PCs for more than five years.

you are viewing a single comment's thread
view the rest of the comments
[–] Salamendacious@lemmy.world 17 points 10 months ago (2 children)

This is a different article but you should find at least some more information on how the malware works with Linux here:

https://www.bleepingcomputer.com/news/security/stripedfly-malware-framework-infects-1-million-windows-linux-hosts/

I'm not a Linux user so I honestly don't know if that article is incredibly helpful or not.

[–] girsaysdoom@sh.itjust.works 19 points 10 months ago* (last edited 10 months ago) (3 children)

From what it's describing, it sounds like it would only impact Linux computers that allow SMB1 access, such as domain-joined systems with samba access allowed. It sounds like this would target mainly enterprise Linux deployments but home Linux setups should be fine for the most part.

[–] Eyron@lemmy.world 11 points 10 months ago (1 children)

They describe an SSH infector, as well as a credentials scanner. To me, that sounds like it started like from exploited/infected Windows computers with SSH access, and then continued from there.

With how many unencrypted SSH keys there are, how most hosts keep a list of the servers they SSH into, and how they can probably bypass some firewall protections once they're inside the network: not a bad idea.

[–] Salamendacious@lemmy.world 6 points 10 months ago

I think the original article talked about "spreading" to Linux machines so that generally tracks with what you're saying that it starts on a Windows machine that itself has access to a Linux machine.

[–] Salamendacious@lemmy.world 1 points 10 months ago

Interesting, thanks for that

[–] Buffalox@lemmy.world 1 points 10 months ago* (last edited 10 months ago) (1 children)

From the part you quoted earlier, it's absolutely useless, and not worth reading.

[–] Salamendacious@lemmy.world 2 points 10 months ago