171 lines
14 KiB
Plaintext
171 lines
14 KiB
Plaintext
|
|
Episode: 3240
|
||
|
|
Title: HPR3240: Linux Under Attack
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3240/hpr3240.mp3
|
||
|
|
Transcribed: 2025-10-24 19:23:16
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
This is Haka Public Radio episode 3244 for Friday the 1st of January 2021.
|
||
|
|
Today's show is entitled, Linux under attack and in part on the series, privacy and security.
|
||
|
|
It is the 210 show on our UK and is about 16 minutes long and carries a clean flag.
|
||
|
|
The summary is a look at how malware is outargeting Linux, especially servers.
|
||
|
|
This episode of HPR is brought to you by archive.org.
|
||
|
|
Support universal access to all knowledge by heading over to archive.org forward slash donate.
|
||
|
|
Hello, this is Huka, welcoming you to Hacker Public Radio and another exciting episode.
|
||
|
|
This is going to be part of our security series, security and privacy.
|
||
|
|
And this one I'm giving the title, Linux under attack.
|
||
|
|
And the idea here is that there's no such thing as software without vulnerabilities.
|
||
|
|
So it follows that Linux, while in some ways more secure than alternatives like Windows,
|
||
|
|
is nonetheless vulnerable to attack.
|
||
|
|
Now, until recently, Linux was to some degree protected by security through obscurity,
|
||
|
|
which is to say that as a fringe all-ass, it was not worth investing much effort into attacking it.
|
||
|
|
But things have changed. Linux is winning the data center at the cloud and the desktop.
|
||
|
|
Consider the data.
|
||
|
|
And I have links in the show notes to back this up.
|
||
|
|
Linux is the most used operating system on Microsoft's Azure platform.
|
||
|
|
Now, Azure is Microsoft's cloud offering, sort of similar to what Amazon offers or other cloud hosting services.
|
||
|
|
And Linux is used more than anything on Microsoft's own cloud platform.
|
||
|
|
Linux has etched out Windows for serving websites.
|
||
|
|
Android, which is a Linux variant OS, is the most used OS in the world, beating out Windows.
|
||
|
|
And a Linux-based operating system powers the popular Chromebooks.
|
||
|
|
So there's no longer anything obscure about Linux.
|
||
|
|
And we should expect to see attacks against it and vulnerabilities being exploited,
|
||
|
|
and indeed we do.
|
||
|
|
And now, quote from the article, link in the show notes from ZDNet,
|
||
|
|
there is still a dangerous assumption among many that malware is only a problem for Windows
|
||
|
|
that might have been more believable a decade or two ago.
|
||
|
|
But the reality is that any computer system that builds up significant market share
|
||
|
|
or plays host to valuable data will now be a target.
|
||
|
|
Linux is increasingly the foundation of many different business systems and vast parts
|
||
|
|
of the cloud. While there are still relatively few threats targeting Linux,
|
||
|
|
there's no reason why that should remain the case.
|
||
|
|
Now, the most serious attacks against Linux are against servers, of course, because Linux is
|
||
|
|
so dominant in the cloud. So I just want to kind of run through some of these and see what we
|
||
|
|
can learn by taking a look at this. The first one I want to talk about is something called E-Berry.
|
||
|
|
Now, E-Berry is an SSH attack. SSH stands for Secure Shell, and it is the more secure replacement
|
||
|
|
for the terribly insecure telnet. It's a way for computers to talk to each other.
|
||
|
|
And we discussed it previously in our SSH introduction and then following SSH episodes and I
|
||
|
|
put a link to the first one in the show notes. Open SSH is the open source implementation of
|
||
|
|
this protocol and is the de facto standard on all Linux distros. The ability to breach SSH
|
||
|
|
gives you access to the server and potentially to anything on the server. That makes open SSH a
|
||
|
|
prime candidate for attacks. Now, one of the early attacks was discovered by researchers at ESET.
|
||
|
|
That's a security research firm. They helped to disrupt a botnet of 25,000 servers that were
|
||
|
|
infected with an open SSH-based backdoor and credential stealer named E-Berry. March 2017,
|
||
|
|
Maxim Senak, a Russian, pled guilty for his role in the creation of the E-Berry malware
|
||
|
|
and for maintaining its infamous botnet, though he was just one member of the group.
|
||
|
|
This malware included a root kit to persist through reboots and a backdoor to give the criminals access.
|
||
|
|
And once they got in, they started stealing credentials and then used the botnet for things
|
||
|
|
like traffic redirects and email spam. A fine as far as it goes, then a gentleman,
|
||
|
|
I use the term loosely, Donald Austin from Florida, managed to install this malware on the
|
||
|
|
kernel.org servers. You may remember when that happened. It was quite a thing in the news.
|
||
|
|
Now, one result of all of this is that the researchers at ESET started to systematically look
|
||
|
|
for open SSH vulnerabilities. And when they looked, they found more. One of the first clues that
|
||
|
|
they would find things is that the E-Berry software would do a check for other SSH malware installs
|
||
|
|
before it installed itself. Their search revealed an entire ecosystem that included 12 new
|
||
|
|
families of malware not previously documented. For a more detailed look at all of these
|
||
|
|
vulnerabilities, there's a research white paper from ESET called The Dark Side of the Forge.
|
||
|
|
Now, that's a pun in the title instead of Forse. It's F-O-R-S-S-H-E.
|
||
|
|
Now, interestingly, there are some common features to all of the malware that they studied.
|
||
|
|
Despite the fact that each one was on a different codebase. Now, they all had hard-coded credentials
|
||
|
|
to enable backdoor access and mechanisms to steal credentials. And when the credentials were
|
||
|
|
stolen, they were always stored locally in a file. Now, if that were all, the criminals would then
|
||
|
|
have to log in using their backdoor credentials and infiltrate the file in some way.
|
||
|
|
But some of the malware had provisions to push the file out through the network.
|
||
|
|
And I quote from an article in HelpNet Security, interestingly, those backdoors were also
|
||
|
|
the most complex ones. Not one was based on publicly available source code, the researchers found.
|
||
|
|
X filtration techniques for stolen SSH credentials are creative and include SMTP,
|
||
|
|
mail sent to the malicious operator, HTTP, DNS, and even custom protocols using TCP and UDP.
|
||
|
|
Now, the best protection against these attacks is to not rely on passwords to authenticate SSH
|
||
|
|
logins. Things like two-factor authentication and encryption keys provide much higher security.
|
||
|
|
And you should always disable SSH logins for the root account. Instead, create a user with admin
|
||
|
|
privileges, whose username is not easily guessed by an attacker. And I'll have a little more to
|
||
|
|
say about this at the end. Now, the next one I want to talk about is something called Drovorub.
|
||
|
|
This software appears to be the work of Russian hacker group APT-28, which is a group operating
|
||
|
|
from the Russian military's GRU Intelligence Unit. It is a multi-component piece of malware targeting
|
||
|
|
Linux systems. I'm going to quote this time from NSA's press release. Drovorub is a Linux malware
|
||
|
|
toolset consisting of an implant coupled with a kernel module root kit, a file transfer and
|
||
|
|
port forwarding tool and a command and control server. When deployed on a victim machine, Drovorub
|
||
|
|
provides the capability for direct communications with actor-controlled C2 infrastructure.
|
||
|
|
File download and upload capabilities. Execution of arbitrary commands, port forwarding of network
|
||
|
|
traffic to other hosts on the network and implements hiding techniques to evade detection.
|
||
|
|
And C2, when you hear that, just needs command and control.
|
||
|
|
The root kit capabilities allow it to not only evade detection, but to survive through
|
||
|
|
system restarts and many anti-well malware measures. We know us from this Russian source because
|
||
|
|
they reused a command and control server identified in previous APT-28 operations.
|
||
|
|
The precise target is not known right now, but could be anything from industrial espionage to
|
||
|
|
election interference. There is some detailed guidance on remediation measures in a PDF and I
|
||
|
|
put a link in the show notes that is written up by the NSA and the FBI. So if you want to learn
|
||
|
|
more about what you can do, check the show notes and download that PDF.
|
||
|
|
Now I am going to quote again from a ZDNet article. Drovorub is a Swiss Army knife of capabilities
|
||
|
|
that allows the attacker to perform many different functions, such as stealing files and remote
|
||
|
|
controlling the victim's computer. And they are quoting McAfee CTO Steve Grobeman.
|
||
|
|
And he goes on to say in addition to Drovorub's multiple capabilities, it is designed for stealth
|
||
|
|
by utilizing advanced root-cut technologies that make detection difficult, the McAfee exec added.
|
||
|
|
The element of stealth allows the operatives to implant the malware in many different types of
|
||
|
|
targets, enabling an attack at any time. Now all of these articles again links in the show notes.
|
||
|
|
Now Lucifer DDoS. This malware is a crypto-jacking and DDoS attack that originally
|
||
|
|
attacked vulnerabilities in software such as Regetto HTTP file server, Jenkins, Oracle web logic,
|
||
|
|
Drupal, Apache struts, Laravel and Windows. The list of targets is fairly long, but now we can add
|
||
|
|
Linux to that list. The fact that it can run, and I am quoting from bleepingcomputer.com,
|
||
|
|
the fact that it can run on Linux-based systems means that it can potentially compromise and make
|
||
|
|
use of high-performance high bandwidth servers in internet data centers. With each node packing a
|
||
|
|
larger punch in terms of DDoS attack capacity, than is typical of most bots running on Windows or
|
||
|
|
IoT-based Linux devices, the Netskout researchers explained.
|
||
|
|
LemonDuck. This is another SSH attack malware. It scans the internet for machines listening to
|
||
|
|
port 22 for logins, then launches a brute force attack using the user name root. We've already
|
||
|
|
talked about why you should disable that. Then uses a list of passwords to try. If it gets into
|
||
|
|
a system, it employs all the usual tricks such as running crime jobs to aid persistence,
|
||
|
|
and scanning for other Linux systems by taking login data from the slash dot SSH slash known
|
||
|
|
underscore hosts file. And there's Fritzfrog. Fritzfrog is yet another SSH attacker with the
|
||
|
|
wrinkle that it's based on a peer-to-peer network rather than a command and control server network.
|
||
|
|
It's basically a combination of a botnet and a crypto miner. It looks reports 22 and 22, 22,
|
||
|
|
and if it gets in, it adds its own SSH public key to the authorized keys file.
|
||
|
|
So, this is just a selection to illustrate the point that Linux does face some challenges here.
|
||
|
|
Now, does that mean Linux is not more secure? Not exactly. Linux certainly can be more secure
|
||
|
|
because the code is open and can be fixed by anyone. The idea that trying to keep code secret
|
||
|
|
breeds security has been thoroughly disproven by the many attacks on proprietary systems.
|
||
|
|
The bad guys will find the vulnerabilities. It's only the researchers that are hampered.
|
||
|
|
But in reading the accounts of many of these attacks, I was struck by how often I heard something
|
||
|
|
like this vulnerability was patched but, or this attacks older versions of,
|
||
|
|
okay, it does no good to create patches if SSH admins don't apply them.
|
||
|
|
Now, I personally apply all patches as soon as I get them on my home network.
|
||
|
|
Now, there's a chance that a patch might cause a problem, though I cannot think of an occasion
|
||
|
|
where that happens to me. But not applying the patches makes me subject to a known vulnerability.
|
||
|
|
Now, that's a home network. In a corporate data center, the appropriate procedure would be to install
|
||
|
|
the patches on a test server right away and run the appropriate tests with an aim of installing
|
||
|
|
the patches as soon as possible on your production servers. Remember, until the patches are applied,
|
||
|
|
you have a known vulnerability there. Next, we mentioned not giving the root account SSH login
|
||
|
|
capabilities. Now, this is only one case of the general principle of disabling default logins.
|
||
|
|
And particularly in this time when so many devices or network connected, even when there's no
|
||
|
|
compelling reason to be, you don't want to have the default admin account enabled.
|
||
|
|
They're actually botnets of light bulbs now because of hard-coded login accounts.
|
||
|
|
And this one change reduces your attack surface. And while it may not guarantee you won't be attacked,
|
||
|
|
it reduces your chances. Many of these malware attacks are just looking for easy pickings.
|
||
|
|
And if your machine is not the easy one, they'll just move on to other machines.
|
||
|
|
And if there's one thing that you really want to take out of this about default admin logins,
|
||
|
|
the most serious one that most people have is their home router.
|
||
|
|
You know, whether it's a Wi-Fi or Ethernet or a combo or whatever, routers ship with default logins.
|
||
|
|
And malware searches for them. And so the very first thing you should do is you should go in,
|
||
|
|
you should delete that account, create a different account where only you know the name
|
||
|
|
and give that account the admin capability. You know, that one thing would protect more
|
||
|
|
home networks than anything else I can think of.
|
||
|
|
Now finally, a lot of these attacks leverage problems with SSH.
|
||
|
|
If you are assisted in, learn how to use SSH safely.
|
||
|
|
I mentioned that we've done a few shows about that on Hector Public Radio.
|
||
|
|
But I want to mention a book, a friend of mine, a fellow named Michael W. Lucas,
|
||
|
|
just released the second edition of this book, SSH Mastery. Open SSH, Puddy Tunnels and Keys.
|
||
|
|
And I think this is the best book out there. And it's where I go when I want to learn more about SSH.
|
||
|
|
And I've put a link in the show notes. I recommend the book very highly.
|
||
|
|
So this is a hook up for Hector Public Radio signing off and as always,
|
||
|
|
encouraging to support Free Software. Bye-bye.
|
||
|
|
You've been listening to Hector Public Radio at HectorPublicRadio.org.
|
||
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
||
|
|
Today's show, like all our shows, was contributed by an HBR listener like yourself.
|
||
|
|
If you ever thought of recording a podcast, then click on our contributing to find out how easy it really is.
|
||
|
|
Hector Public Radio was founded by the Digital Dove Pound and the Infonomicom Computer Club.
|
||
|
|
And it's part of the binary revolution at binrev.com.
|
||
|
|
If you have comments on today's show, please email the host directly, leave a comment on the website
|
||
|
|
or record a follow-up episode yourself. Unless otherwise stated,
|
||
|
|
today's show is released on the Creative Commons,
|
||
|
|
Attribution, ShareLite, free.or license.
|