this post was submitted on 29 Oct 2023
275 points (93.9% liked)

Technology

58061 readers
31 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Antivirus provider Kaspersky uncovers a sophisticated piece of 'StripedFly' malware camouflaged as a cryptocurrency miner that's been targeting PCs for more than five years.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 35 points 10 months ago* (last edited 10 months ago) (3 children)

According to Kaspersky, StripedFly uses its own custom EternalBlue attack to infiltrate unpatched Windows systems and quietly spread across a victim’s network, including to Linux machines.

Yeah I call bullshit on that. Absolutely zero description of any vulnerability.

[–] [email protected] 17 points 10 months ago (2 children)

This is a different article but you should find at least some more information on how the malware works with Linux here:

https://www.bleepingcomputer.com/news/security/stripedfly-malware-framework-infects-1-million-windows-linux-hosts/

I'm not a Linux user so I honestly don't know if that article is incredibly helpful or not.

[–] [email protected] 19 points 10 months ago* (last edited 10 months ago) (3 children)

From what it's describing, it sounds like it would only impact Linux computers that allow SMB1 access, such as domain-joined systems with samba access allowed. It sounds like this would target mainly enterprise Linux deployments but home Linux setups should be fine for the most part.

[–] [email protected] 11 points 10 months ago (1 children)

They describe an SSH infector, as well as a credentials scanner. To me, that sounds like it started like from exploited/infected Windows computers with SSH access, and then continued from there.

With how many unencrypted SSH keys there are, how most hosts keep a list of the servers they SSH into, and how they can probably bypass some firewall protections once they're inside the network: not a bad idea.

[–] [email protected] 6 points 10 months ago

I think the original article talked about "spreading" to Linux machines so that generally tracks with what you're saying that it starts on a Windows machine that itself has access to a Linux machine.

[–] [email protected] 1 points 10 months ago

Interesting, thanks for that

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago) (1 children)

From the part you quoted earlier, it's absolutely useless, and not worth reading.

[–] [email protected] 2 points 10 months ago
[–] [email protected] 7 points 10 months ago

I don't know why op did not want to share the original report, but it is linked in the article: https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/

[–] [email protected] 6 points 10 months ago* (last edited 10 months ago) (2 children)

I too am struggling to find the actual Linux vuln. It sounds like it steals ssh keys, so maybe just poorly configured hosts?

[–] [email protected] 0 points 10 months ago

You should always have a file your home folder named SSH keys and Root password. /s
That's not just poor configuration, that's complete disregard for security.