- cross-posted to:
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
Stealthy Linux rootkit found in the wild after going undetected for 2 years::Krasue infects telecom firms in Thailand using techniques for staying under the radar.
Zero useful info: what is the attack vector / vulnerability exploited? Without that info, this is useless
Well, most of us can relax I believe: The rootkit supports Linux Kernel versions are 2.6x/3.10.x
https://www.bleepingcomputer.com/news/security/krasue-rat-malware-hides-on-linux-servers-using-embedded-rootkits/
The only thing I know runs that kernel version is my Wii because it needs an old kernel for ppc32 support
Now that is helpful information - current distros being on 6.x and whatnot… Thanks!
From the article:
So no one knows yet. But I feel that the existence of malware in the wild is newsworthy, even if we don’t know how it got there. Regardless, you and I probably don’t have to worry about it unless you’re a Thai telecom.
And unless we run a 3.x kernel as another commentor pointed out…