Is 2009 the year of Linux malware?
It is common knowledge that Linux users needn't worry about viruses because users don't run as root. I've never understood the reasoning behind this. Here are a few of the malicious things that a program can do without being root on Ubuntu 8.10:
Once malware has its grubby code all over your home folder, you are one fake dialog box away from giving it complete control over your system:
If you have ever run a program or script that wasn't included in your distribution, then you could have been infected with malware. (You weren't.)
Ubuntu in particular must be very enticing for malware writers, because:
Is 2009 the year of the linux desktop malware? How long until we see headlines like, "Researchers find massive botnet based on linux 2.30"?
Add an entry to .config/autostart
Change a line in .mozilla/firefox/*/prefs.js
Add a file to .local/share/applications
Putting them in .gnome2/system32 seems somehow appropriate
Just pick a port above 1024, and update the firewall with uPnp
put it in .mozilla/firefox/*/extensions/
call it "Ubuntu System Integration Plugin Helper"
If you are interested in more examples, The Malware Project (PDF) is a great read that takes you step by step through an actual social engineering experiment with users. The results will surprise you.
top
, ps
, and System Monitor
with exact clones that neglect to display your processes. This is much easier than hacking up the Windows Task Manager internal memory. Or just do everything in kernel mode for ultimate captcha cracking, DDOS power.
Further Reading
It only got a few hits and it's hard to keep up to date, so I haven't maintained it.
Please tell me what is the best way to access this file.I am interested in learning more about this issue.
Regards
Ashish
Email-technoconsulting4smbs@gmail.com
Statistically if I chose to write for say opensuse, then I infect a few opensuse users. Not to mention a patch will come out as soon as its detected. A virus can be written but its damage will be contained, so quickly and easily.
Are people out there that dumb? You've just made a very short list of how easy it is to install malware to keylog someone's banking info if they wanted on linux and it doesn't sink in. Great article!
Once Linux catches a significant market share, less technically informed users will use it. They are obvious targets for social engineering and malware scams.
It's still more difficult to install malware by the commandline. People that actually tinker with sources.list and terminal commands are expected to have a greater understanding of involved risks.
However with new users, this won't be the case. As you describe, some with copy and paste code and commands from formus/bbs.
There is nothing we can do about that. It's inevitable. Maybe the major forums are self-regulating, and malware trickery won't have as a large impact as with the Windows environment. Still, some user education might be in order. As you conclude, we are absolutely unprepared for when that starts.
So unless 2009 is also the year of the linux desktop in a big way...
Experiments in making money online
Is it possible to make money on the internet, if you try really hard? I want to find out. I have always been interested in getting money for doing nothing.C++: A language for next generation web apps
On Monday, I was pleased to be an uninvited speaker at Waterloo Devhouse, hosted in Postrank's magnificent office. After making some surreptitious alterations to their agile development wall, I gave a tongue-in-cheek talk on how C++ can fit in to a web application.Keeping Abreast of Pornographic Research in Computer Science
Burgeoning numbers of Ph.D's and grad students are choosing to study pornography. Techniques for the analysis of "objectionable images" are gaining increased attention (and grant money) from governments and research institutions around the world, as well as Google. But what, exactly, does computer science have to do with porn? In the name of academic persuit, let's roll up our sleeves and plunge deeply into this often hidden area that lies between the covers of top-shelf research journals.VP trees: A data structure for finding stuff fast
Let's say you have millions of pictures of faces tagged with names. Given a new photo, how do you find the name of person that the photo most resembles?In the cases I mentioned, each record has hundreds or thousands of elements: the pixels in a photo, or patterns in a sound snippet, or web usage data. These records can be regarded as points in high dimensional space. When you look at a points in space, they tend to form clusters, and you can infer a lot by looking at ones nearby.