Antivirus provider Kaspersky uncovers a sophisticated piece of ‘StripedFly’ malware camouflaged as a cryptocurrency miner that’s been targeting PCs for more than five years.

  • @Buffalox
    link
    English
    35
    edit-2
    1 year ago

    According to Kaspersky, StripedFly uses its own custom EternalBlue attack to infiltrate unpatched Windows systems and quietly spread across a victim’s network, including to Linux machines.

    Yeah I call bullshit on that. Absolutely zero description of any vulnerability.

      • @[email protected]
        link
        fedilink
        English
        19
        edit-2
        1 year ago

        From what it’s describing, it sounds like it would only impact Linux computers that allow SMB1 access, such as domain-joined systems with samba access allowed. It sounds like this would target mainly enterprise Linux deployments but home Linux setups should be fine for the most part.

        • @Eyron
          link
          English
          111 year ago

          They describe an SSH infector, as well as a credentials scanner. To me, that sounds like it started like from exploited/infected Windows computers with SSH access, and then continued from there.

          With how many unencrypted SSH keys there are, how most hosts keep a list of the servers they SSH into, and how they can probably bypass some firewall protections once they’re inside the network: not a bad idea.

          • @SalamendaciousOP
            link
            English
            61 year ago

            I think the original article talked about “spreading” to Linux machines so that generally tracks with what you’re saying that it starts on a Windows machine that itself has access to a Linux machine.

          • @SalamendaciousOP
            link
            English
            51 year ago

            My job still had Windows 95 machines running just a couple years ago. Could there still be Samba1 running out there or does Linux update differently?

            • lemmyvore
              link
              fedilink
              English
              81 year ago

              Of course there is. Unfortunately the average Linux self-hoster doesn’t have much of a clue and probably runs vulnerable Samba (even if it’s not S1). Of course it doesn’t help that Samba seems to get a vulnerability about once a week. It’s one of the most targeted pieces of network software you could run.

              • @SalamendaciousOP
                link
                English
                31 year ago

                I know that Linux is a host of OSs but generally speaking is it up to the user to keep their software up to date or is there some kind of automatic updating process?

                • lemmyvore
                  link
                  fedilink
                  English
                  21 year ago

                  There are automated updates, especially for security issues, but since Linux users feel they are power users and seldom have to deal with security issues, they often disable updates and do them manually. If and when they remember. And for self-hosted software it’s worst because often they don’t even consider running updates.

                  • @[email protected]
                    link
                    fedilink
                    English
                    41 year ago

                    This depends entirely on the distribution. The distribution I run has no automatic updates by default. I do it manually.

                    I could easily set it up if I wanted to, but yeah. There is no consensus, it’s just case-by-case basis. Some do have automatic updates by default.

                  • @SalamendaciousOP
                    link
                    English
                    11 year ago

                    Some day I’d like to try Linux. Another commentor on another post was telling me about Clover for old Chromebooks. The amount of variety in Linux can be intimidating.

            • @micka190
              link
              English
              51 year ago

              The bank I work at still has core systems running Lotus 🙃

              • @SalamendaciousOP
                link
                English
                61 year ago

                Lotus 123 was outdated when I was still a kid. That’s impressive.

            • Toes♀
              link
              fedilink
              English
              41 year ago

              Yeah windows 2000 assembly robots, too expensive to replace and too critical to not keep alive.

              • @SalamendaciousOP
                link
                English
                21 year ago

                Well those were controlling a conveyor belt system that maintenance told me they bought used in the 90s.

              • @SalamendaciousOP
                link
                English
                101 year ago

                Those machines were controlling a conveyor belt system and weren’t online. I was told the software they were running wasn’t available for other OSs. They were locked in a cabinet. That entire conveyor system is now gone so those machines are probably gone too.

                  • @SalamendaciousOP
                    link
                    English
                    21 year ago

                    You’re going over my head now but looking at Wikipedia that looks about right. It was controlling machinery based on input from various sensors.

      • @Buffalox
        link
        English
        1
        edit-2
        1 year ago

        From the part you quoted earlier, it’s absolutely useless, and not worth reading.

    • @[email protected]
      link
      fedilink
      English
      6
      edit-2
      1 year ago

      I too am struggling to find the actual Linux vuln. It sounds like it steals ssh keys, so maybe just poorly configured hosts?

      • @Buffalox
        link
        English
        01 year ago

        You should always have a file your home folder named SSH keys and Root password. /s
        That’s not just poor configuration, that’s complete disregard for security.