Cracked Linux Boxes Used to Wield Windows Botnets 309
m-stone writes "Online auction house eBay recently did a threat assessment to better understand the forces ranging against them. The company is keeping the fine details under wraps, but the biggest source of danger for the company is apparently botnets. You're never going to guess who was running them. '[Dave Cullinane, eBay's chief information and security officer] noticed an unusual trend when taking down phishing sites. 'The vast majority of the threats we saw were rootkitted Linux boxes, which was rather startling. We expected Microsoft boxes,' he said. Rootkit software covers the tracks of the attackers and can be extremely difficult to detect. According to Cullinane, none of the Linux operators whose machines had been compromised were even aware they'd been infected. Because Linux is highly reliable and a great platform for running server software, Linux machines are desired by phishers, who set up fake websites, hoping to lure victims into disclosing their passwords."
Confirmed (Score:5, Informative)
Our set-up is that we have a host OS install doing nothing but running VMware Server and then any real stuff gets done in a VM, so this was easy for us to recover from quickly via VM snapshotting. But still, it's a trend that's noticeably on the increase.
Cheers,
Ian
Re:Confirmed (Score:5, Funny)
Re:Confirmed (Score:4, Interesting)
OT: What happened (Score:3, Interesting)
Re: (Score:2)
Maybe .... (Score:5, Funny)
Happens to sites that hosts others too... (Score:5, Insightful)
and yes they are running Linux... they apparently didn't cover all their bases and were caught by more than one known exploit and some default settings.
Just because its Linux does not make it secure, you actually have to use it correctly.
Brute Force Attacks (Score:5, Informative)
I'm sure pretty much everybody who is running a Linux server (or any server as a matter of fact), especially with services like SSH enabled, is currently subject to brute force attacks.
When I looked at my auth log I noticed a huge amount of brute force attacks for all my servers, so I installed denyhosts [sourceforge.net], which seems to work fine.
I guess the problem is also that in many distributions SSH servers are configured to allow root logins, and if nobody looks at the log files these go totally unnoticed.
Re:Brute Force Attacks (Score:5, Informative)
The "Host" sections in the
Re:Brute Force Attacks (Score:4, Insightful)
It's so annoying when people latch on to a stupid mantra like that without understanding it. Just like how nowadays you can't mention rape without someone reminding you that "Rape is about power, not sex." People just love catchphrases, I think.
Re:Brute Force Attacks (Score:5, Funny)
Re: (Score:3, Informative)
Example:
SSH on 22 with no authentication -> bad
ssh on 2200 with no authentication -> just as bad
ssh on 22 with strong authentication -> good and not burdensome
ssh on 2200 with strong auth -> better and not burdensome.
As Bruce says it is all about layers of security and understanding the deficits of each
Re:Brute Force Attacks (Score:4, Informative)
Re: (Score:2)
Using a different port saves network bandwidth and also human bandwidth when reading the log summaries. This means that more time can be devoted to analysing log data that is not a result of simple bot-based attacks.
Disabling password based login is a really good idea!
Re:Confirmed (Score:5, Interesting)
You never see many people who compromise a windows machine and manually set up anything on it, windows machines are typically mass hacked and used as throwaway systems, for spamming or dossing (once a large flood of dos or spam comes from a system, it very quickly gets noticed and the system usually gets shut down). The hassle of using windows remotely (half assed command line interface etc), lack of default tools and typical low uptimes/stability discourage them being used interactively or for any kind of non-throwaway uses.
Conversely, unix machines are typically more stable, and have a far more flexible interface that's more geared up to remote cli usage. Installing something like an IRC server to collect malware is often much easier, and there's usually package management which can be used to easily install any external libraries or additional tools that might be required. There are also typically standard server apps installed and ready to use (ftpd, apache, rcp, tftp etc) which can be used to host malware, for easy download to other compromised machines (most systems have ftp/rcp/tftp clients by default, even windows).
Crackers will often turn a compromised unix machine into their "home", and keep a set of tools/exploits in a hidden directory, and use the machine for manual probing, testing of new tools and launching of other attacks, but they will rarely use windows systems for anything other than dossing/spamming or defacing a website if it hosts one.
Re: (Score:3, Insightful)
Re: (Score:2)
The disadvantage of an IRC based control bot, is the lack of flexibility. You can only use the functions offered by the bot, and if you need new functions you need to update your bots. Sure you could make the bot provide an interface to the underlying command line, but then your back to the original point of the windows cli sucking.
Yo
Re: (Score:2, Interesting)
If you use a CLI session then you either have a TCP connection leading back to where you are (a bad idea if you don't want to be caught) or you bounce the connection between multiple machines (giving serious problems of lag). An IRC (or similar server based) control
Re:Confirmed (Score:4, Interesting)
It's patched when Ubuntu tells me. The same as my XP install.
My knowledge of Windows security is greater than that of Linux - I wouldn't really know where to start looking on my Ubuntu install. So is my XP or Ubuntu install more secure?
In theory it's the Ubuntu install, but until I spend the time to learn more about it who knows.
Re: (Score:3, Informative)
Use strong passwords. Make sure all other users use strong passwords. With some exploits just needing a user account,
Re:Confirmed (Score:4, Insightful)
Linux, Apache and all the server-side scripting languages normally aren't the problem. Many hosts I have audited have old installations of (mostly) PHP-based software, and these automated attacks tend to target them leading to (sometimes multiple) botnet infections.
Many administrators didn't even know what was running on their servers. It only takes a couple of minutes to install packages like *coughthesecurityholecalled* phpBB, however if you are doing this independently from your package management system you will lose track of the installs. Even worse, the installs won't be automatically upgraded, which is a major reason for sticking with stock Debian/RHEL/SuSE package repositories.
If you choose to install software outside your distribution's package management system, subscribe to the announcement-lists of the software used. Document on which servers you installed what software. And if you leave the company, make sure your replacement can hop right in and will know what you know.
Common sense, but far too often forgotten or ignored.
Re: (Score:3, Interesting)
9 out of 10 phishers agree (Score:2)
2 cents,
QueenB.
Re:Confirmed (Score:5, Informative)
phpbb, Drupal and PHPNuke attempts mostly. Plus old sshd vulnerabilities, though we're up to date there and nothing got through.
Cheers,
Ian
(oh yeah, and first post! Only took a mere eight years or so...)
Re:Confirmed (Score:5, Interesting)
I got like thousands of bruteforce attacks on ftp plus some on phpBB.
I also noticed few weeks ago that when they couldn't break in they just DDosed it.
It looks like it's getting serious, especially if you're server is registered with some DNS name, not just IP.
Re: (Score:3, Informative)
My biggest problems stem from foolish users, i host a lot of customers who have the ability to run PHP apps and choose their own passwords. Fortunately, each user has their own account, so i can easily check which user owns any malicious processes or files that appear on the system.
Re:Confirmed (Score:5, Informative)
May want to be careful about that assumption. A lot of these things go out under the apache user and the mails via the www-data@somehost.invalid account.
Look for tell-tale things like apache processes running when you're an apache2-only site (they're disguised processes that are really something else, obviously). Do an ls -al in all the home directories, look for directories whose name is just a space character, check
Cheers,
Ian
Re: (Score:3, Informative)
A process just called "apache" or "./apache" would stick out like a sore thumb...
Apache doesn't run as a single user either, each site runs under it's own userid.
There is also trusted path execution enabled on the server, so the web users can only execute programs which are owned by root, and located inside a directory owned by root, so they can't upload and execute arbitrary binaries, all they could really leave running is a php script.
Re: (Score:3, Informative)
Of course, PHP these days has all of the network goodies needed to make "just a php script" still a serious problem. A good idea is to make sure that anything the webserver can serve can't be written from the webserver's user, i.e. uploaded data goes outside the docroot. Of course then we'll get tears about how hard it is for everyone to install forum software and their blog since they can't just unzip/untar their code and mark it all writable.
Re:Your sig [OT] (Score:3, Informative)
Here, your sig does not introduce any information that is contra
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Re:Confirmed (Score:5, Informative)
Re: (Score:2, Informative)
At least, I think that's generally thought to be a good thing to do.
Re: (Score:3, Insightful)
Being able to see the source code, isn't a bad thing, as you imply. If there's a hole in the code, I would sooner someone find it fast and then it gets fixed, rather than have closed code, which may have a hole in it, which no one knows about. Because given time, someone will find that hole, even if its close sourced (which is no long term protection). What open source gives is effectively better debugging of the code, as it allows people to dig o
Re:Speaking as a Bot... (Score:5, Insightful)
With windows of course those poor hard working crackers and continually having to rebuild their botnet as other crackers pilfer their bots as readily as they orginally gained, 24/7 no rest for the wicked.
So winbots while easy to gain are nearly impossible to keep because of course they are just so slutty, they are anybodies ;).
Re: (Score:2)
For anyone running 64-bit, there is a recently-publicized exploit that allows users to grab root. If you haven't been keeping your kernel patched, you could be vulnerable. If someone gets root then you won't be able to spot intrusions by user-owned processes.
Re: (Score:3, Informative)
Re:Confirmed (Score:4, Informative)
Re: (Score:2)
Re: (Score:3, Funny)
give them time...
Re: (Score:3, Informative)
Re: (Score:2)
That's the problem - "Its Linux, so its secure!" (Score:4, Informative)
They don't realize, like any other operating system, if you want it secure, you have to work to make it secure. Everything from using good passwords, to not running unecessary services, to getting behind a firewall or two.
And, as usually, the biggest security hole is between the keyboard and the chair.
true (Score:5, Insightful)
A fair amount of it, I'm sorry to say, is due to the perception that Linux boxes are much more secure than Windows and therefore don't need (a) up-to-date patches (b) proper security reviews of any app code (which these days usually means web apps) (c) defence in depth (block outbound connections from your web server, except for a hole poked in tcp|udp/53 to/from your DNS server if needed (d) proper security monitoring. Review your firewall logs! Run an external syslogNG box! use netflow, nagios, ntop etc -- can you account for all the packet flows from the machine? If you have time to spare, look into Snort.
This is not an accident..... (Score:2)
1) Get the enemy to do horrible things at your direction.
2) Hope no one notices that you are really calling the shots.
3) Make them look unreliable
4) Profit!
Re: (Score:2)
Re: (Score:3, Insightful)
Seriously though, accounting for every packet takes more than just being a good user, it'd be a monumental task if you've got a desktop Linux distro. I'd like to think that I know all the things that are going out on the Internet from my home network but there are limits, especially when processes are disguising their traffic.
I mean if I find some odd packets going out then discover the name of the host their going appears to be an update server for some application I use then my i
Thus proving Linux is not as secure as touted. (Score:5, Funny)
Anyone else find it funny... (Score:2, Funny)
Re: (Score:2)
Seriously, though... It really does make perfect sense. It's a revenue stream for them, it's not really that different from a business setting up Linux servers for all their Windows desktops to connect to. The really important systems you want on something that's stable. I'd like to believe the availability of unsecured Linux systems is some sort of indication that more new people are starting to use it, but that be a bit o
Remote ease-of-use (Score:5, Insightful)
Good News & Bad News (Score:5, Insightful)
Linux is becoming so respected and desired as an operating system for servers that phishers & hackers are slowly turning their attention towards it being profitable.
I think this will be the true test for Linux to prove that it can beat Windows in all departments.
I actually see this as good news although I must confess that when I get home I'm going to check & double check the configurations on the ports on my router and all my Linux boxes. When toying with app servers & apache, I have noticed tons of port scanners probing my Linux boxes. I paid them no mind although now
Re:Good News & Bad News (Score:5, Informative)
Re: (Score:3, Informative)
Suspicious network activities (bad logins, reverse DNS issues...) are printed on the console and e-mailed to you each day.
Every root logins also printed on the console.
System modifications (user accounts, system files permissions, disk usage, start scripts modifications) are alse mailed to you (some maybe only once a week)
I only check regularly the console, and once a month or so I check the e-mails. (It's my home server BTW, don't ne
Re: (Score:2)
Linux is becoming so respected and desired as an operating system for servers that phishers & hackers are slowly turning their attention towards it being profitable.
Windows vs. Linux (Score:5, Informative)
Linux vs. BSD (Score:2)
Useful UDP services (Score:3, Informative)
Interesting to note (Score:5, Insightful)
Still looks bad for Windows. Plus, here's betting they're servers, and not home computers behind a plain old linksys router.
-Nathan
Re: (Score:3, Interesting)
Wouldn't that be merely a function of how many Linux boxes vs Windows boxes are out there?
I know slashdotters don't like to hear that, they always argue that popularity has no bearing on how often one gets attacked and comrpomised, but using Occam's razor when pondering this new info, one would conclude that the only reason there are more Windows bots than Linux ones is that there are mo
The Money Quote (Score:5, Insightful)
Re: (Score:2)
I've had a Linux box hacked years ago and the guy that did it was trying to control a group of other machines with it. Nothing gives you command and control of a lot of machines like a nice *nix environment.
The ratio of compromised machines is probably 10:1 windows to linux, but the purpose of the compromised machine and it's importance is Linux first, Windows second.
Good catch (Score:2)
To be fair, I don't have a hard time believing they'd really like some good, stable machines as their controller...but it's all a bit odd.
Mod parent up. (Score:2)
Re: (Score:2)
Not that I expect a corporation to be "nice" just for the heck of it, but it would be very useful for Internet security at large if they released a list of the "most often exploited" third-party Linux apps. TFA implies that the primary attack vector is third-party apps with known, unpatched vulnerabilities:
Re: (Score:3, Interesting)
This can help everyone avoid those apps or perhaps even get them fixed (through the pressure of public humiliation).
Re: (Score:2)
Thank God. Now we can just dismiss this info as paid-for FUD.
Strange comments (Score:3, Interesting)
While I agree that Linux is a reliable OS, I doubt that is a reason for attackers to target it for running phishing web servers either. A good reason for targeting an OS is that you know it well and can easily write code for it. Given that many insecure machines can be obtained running any OS you please it makes sense that attackers will target their attack on machines that they know well. Maybe the criminals in question just enjoy Linux programming!
http://survey.netcraft.com/Reports/200708/ [netcraft.com]
Then there's the issue of where servers are located, if you want reliable servers on the net then often the location of the server (in terms of a server room with UPS etc) is more important than the OS. What's the server market share for Linux? The above URL shows Apache leading the field for web servers and most Apache installations run on Linux...
It seems that if you want to own some web servers then aiming at Apache on Linux gives the largest number of potential targets - whether that gives the largest number of vulnerable targets is another matter.
New overlords? (Score:2, Funny)
Fear our new linux overlords?
Vigilante botnet destruction (Score:2)
Re: (Score:2)
We new this would happen, so lets fight. (Score:2)
Upgrades. Don't run old versions of Linux Support has run out on. Upgrade.
Lets put emphasis on security, and develop new models.
Hear! Hear! (Score:2)
Nice work on the call to action. Not enough of that on
something doesn't make sense (Score:2)
* I haven't RTFA
Conflicting Info (Score:4, Interesting)
Cullinane: "The vast majority of the threats we saw were rootkitted Linux boxes, which was rather startling. We expected Microsoft boxes,"
Alfred Huger: "We see a lot of Linux machines used in phishing, We see them as part of the command and control networks for botnets, but we rarely see them be the actual bots. Botnets are almost uniformly Windows-based."
Seems like people are jumping on this as "linux bad!" where in fact the article is fairly neutral, Colinane has one opinion, Huger has another (and generally more accepted) opinion. Haydn.
Re: (Score:2)
helps to have a static IP address (Score:2, Redundant)
I've seen a few of these (Score:5, Interesting)
Case #1: Customer running a web server had vulnerable PHP applications (I believe it was an outdated WordPress). Someone was able to use this vulnerability to wget a few php scripts and bury them under some subfolders.
Case #2: Customer had a non-root account with a weak password. This account was in the "root" group, giving it write access to a number of system files. Cracker was able to brute force the password quite easily, make a directory called eBay under
In both cases, the php scripts were logging username and password guesses into a text file. The text file was within the same web root, allowing the cracker to easily grab the latest passwords over http instead of needing to re-crack. Also, in both cases, there were at least a dozen usernames and passwords in the text files.
The lesson: Keep your web apps up to date, use strong passwords, and don't add anyone to the root group.
double standard (Score:5, Insightful)
So when phishers target windows servers, it's because windows has horrible security, but when they target linux servers, it's because linux is just awesome?
Here's what I know... (Score:3, Interesting)
One day it was noticed that the site was malfunctioning and so a call was placed with APlus. We were informed that there was some sort of compromise and initially, at least, it was stated that it had something to do with Plesk. (Later queries denied that Plesk was at fault) After a day or so, a V.P. in charge of this stuff sent out a broadcast email to all of their hosting clients explaining that, in no uncertain terms, that it was the CUSTOMERs' fault that this had occurred.
Well, let's ignore the crappy customer-service issue this brings about.
The fact that this company offers up Fedora as their preferred flavor for hosting is ridiculous! It's a development distribution primarily aimed at the desktop with somewhere between 1 and two year update availability. Since a lot of their machines were running Fedora Core releases at least as old as Fedora Core 2, I'd say a good portion of the blame rests on APlus for their CONTINUED selection of Fedora as their distribution of supported choice. It has a SHORT LIFE! It stops getting updated after a year or so. It's idiotic to run a server with such a short support life cycle. Forget about blaming customers for not keeping their boxes updated. It couldn't be done with the distros that were affected in the first place.
But yes, my box was affected by this attack as well... and they STILL will not identify the actual point of compromise though they still deny it was Plesk. I find it ironic that I was, at the time, already talking to them about moving my box to CentOS and porting the web site code (that their developers created) to it. Interestingly, all sales people I spoke with said "we don't do that." And when I pointed out that it was their company that created the code, they said "we don't do that."
So over that weekend, I managed to port the web site code and database over from the original host to a CentOS5 box. I don't know PHP. I know a *little* about programming and I know how to use Google... that was enough to get be by. (Apparently, "this" became a reserved word in current versions of PHP and the old code named objects "this$" a lot!)
Anyway... it had been a mess and the best resolution was to move away from APlus. It's unfortunate that I cannot get the truth from them about what exactly happened... we just get blamed without specifics as to what or how it happened.
Re: (Score:2)
Discalimer: I am a Fedora maintainer.
Not surprising (Score:2)
Probably been going on longer than thought (Score:2)
*sigh*
Re: (Score:2)
Root not needed to host phishing scams (Score:5, Informative)
company. I have come across many Linux servers that are compromised and being
used to host phishing scams, spamware, IRC servers, etc. Rarely, however, do I
see a "root'ed" server -- that is, a server on which an unauthorized
person or program has gained root privileges illicitly. In fact, having root
access is not necessary to host web content, send mail or provide other
Internet-facing services.
All that is needed is the privilege to put content served by the web server in
place. That could be a script for server-side execution, page or fragment for
browser- (client-) side execution, etc. If you can upload to the web content
(DocumentRoot or include) directories and the web server automatically servers
that content, you, too, can host a phishing scam or illicit media for download.
If a directory in the DocumentRoot tree on a web server can be written to by the
web server (the apache or nobody system account) then it is easy to inject one's
illicit content on that server. OS is irrelevant at that point. In fact, if a
web server has world- or apache-writable directories in the web content area the
OS *must* allow any web client to upload whatever they desire to that server.
It is the responsibility of the owner of the server to restrict who gets to
upload what content to his/her server.
I try to explain to web designers that granting write access to the
apache/nobody user is BAD, but often I hear back: "Ya, but, I can't make
the script work without opening the permissions." Usually, this is done on
PHP Content Management System portal sites that allow content to be uploaded
directly from the web browser by arbitrary users. There is a little bit of
effort required to make doing this difficult -- and it can be tricky to get
right -- but forcing the script to work by removing world/apache write
privileges is EASY:
$ sudo chmod -R 777
Ugh. Then, when that same customer is complaining that, "Hey! I've been
hacked!" I respond, "no, you haven't. You been compromised. You
allowed *anyone* to upload *anything* to your server and set apache to
automatically server that content. You were trusting *everyone* on the Internet
to behave. Your trust was broken and now your server is distributing phishing
scams/malware/kidde porn/spam."
If you ever think you need to "open up" permissions so your PHP script
will "run right" you either need a different PHP script or help making
the script run "safely." It's harder than chmod'ing 777 but it's
definitely worth doing.
One server I worked on had a lazy owner who allowed apache full write and
execute access to his web content directories. He would not upgrade his PHP
scripts to patched versions that plugged well-publicized holes. After repeated
warnings I received a frantic call from him that his server was
"hacked" and running a banking phishing scam. I checked the weblogs
and found that 20,000 people had clicked the phishing scam links from their
webmail inbox and retrieved the malware-ladden web pages with Internet Explorer
-- meaning many of these people were sending their data right to the
Russian/terrorist criminals for funding their illicit operations. The customer
asked that I call the FBI to "find out who is responsible" and I said
I didn't need to make that call to find out: he was responsible.
That customer is now fully-turned around and is complying with the necessary
steps to ensure that his server is not used for illicit purposes any longer.
Root was never required for these compromises. Just poor administration.
How they hack (Score:2)
About 3 years ago, I sen
Would the average Slashdotter learn something? (Score:2)
On the desktop, people hack Windows machines since that's what most desktop Machines are. On the server side, people hack more Linux machines since that's what most servers are.
Hacked Linux machines are hacked with a specific purpose in mind, and so are Windows machines. In fact, in both cases, the attack vector is usually an application running on said OS. Be it PHP script, server daemon, your browser or even music player on Windows.
Just like the articl
Hosted Environments (Score:4, Insightful)
Of course, I could have paid extra to get a more secure box, but budget was an issue, and my plans were pretty simple for the machine.
Another problem is that a lot of webmasters with dedicated boxes and virtual servers end up running older and insecure versions of software - from mail servers to web servers, etc. because the software is all wrapped as part of Plesk or something similar. When security patches come out, the turnaround time for updates from the software providers is far from instantaneous.
A third problem is efficiency. If your system has been rooted, it's easy to not notice as long as the person who rooted you isn't abusing your system resources.
Recovering a rooted system is a problem as well - sys admins in general could stand to take a lesson from rootkits to protect their own system. I've seen two instances myself where overwritten binaries like ps and ls could not be reverted without a great deal of effort.
Further - people who get "Managed" servers expect that they have a secure system and that their system is being monitored for security issues regularly. From what I've seen, "Managed" means that vendor provided packages get updated automatically and uptime may be monitored, but that's a far cry from someone actually managing a system.
Linux can be secure, but I think the vast majority of web servers out there are wide open targets, much like all those windows ME boxes attached directly to cable modems.
rootkited Linux boxes cause of phishing .. (Score:3, Interesting)
Must be a slow day at Computerworld. Like, how do they equate Linux with an increase in phishing. How did eBay discover all these rooted Linux boxes? Who gathered the data, how was it gathered? Why would phishers use rooted Linux boxes when that would draw attention to themselves, why not hire a box in a server farm or why not just hack eBay [slashdot.org].
Some comments on rootkits (Score:5, Informative)
The www-data (Debian / Ubuntu) or apache (Fedora) user should not be running any process other than apache2 or httpd. If you see something like "accepting connections", that's a sign that someone could be running something nasty.
In general, watch for world-writable directories (they list with a green background in Debian) because that's one of the first steps in cracking a box
iptables -I INPUT 1 -s 10.20.30.40/32 -j ACCEPT
(replace 10.20.30.40/32 by a subnet specifier which will always contain your own IP address -- get this from your broadband company -- and just to make you all jealous, my one ends in
Note that the binaries in this rootkit are 32-bit
This isn't a Linux botnet. PHP is a pox. (Score:4, Informative)
> I'm going to chalk this up (tentatively) to the increasing popularity of
> Linux, which means that a subset of users will be those who don't actually
> know what they're doing, and how to protect a box-- something long the norm
> in the Windows world:
>
> http://computerworld.co.nz/news.nsf/scrt/CD0B9D97EE6FE411CC25736A000E4723 [computerworld.co.nz]
>
> While there, he noticed an unusual trend when taking down phishing sites.
>> "The vast majority of the threats we saw were rootkitted Linux boxes,
>> which was rather startling. We expected Microsoft boxes," he said.
I am not surprised in the least that this was their conclusion. I don't chalk it up to the increasing popularity of Linux at all. I have never (not once) run across a Linux box operating in a botnet. Nor can anyone name a botnet software that infects Linux boxes. In the last 5 years I have found only one Linux box that had a security issue and that was because of PHP (*spit*) which had an XML-RPC exploit a while back and allowed someone to make the box host a fishing website that looked like some bank website. It seems very rare that a Linux desktop (not a webserver) would fall victim to this. I have never seen a security incident such as a botnet on a Linux desktop. I have seen that phishing page on the Linux server that hosted the bogus PHP install. That's it.
And I suspect that they are using terminology incorrectly. A Linux box hosting a fishing site is not part of a botnet. I can understand how Linux boxes would be more popular for fishing websites. PHP is popular and is a pox on Linux as PHP released a bunch of absolute garbage which only happens to run on Linux. It can run on Windows also but that is the expensive and less reliable way to do it so few people do. If people make a conscious decision to install software on Linux that lets just about anyone use the box for whatever they want such as PHP often does I don't think counts against Linux security.
Glancing over the article I immediately spotted this:
"eBay recently did an in-depth analysis of its threat situation, and while the company is not releasing the results of this analysis, it did uncover a huge number of hacked, botnet computers, said Dave Cullinane, eBay's chief information and security officer, speaking at a Microsoft-sponsored security symposium at Santa Clara University."
I challenge anyone to find a single MS sponsored paper or symposium which DOESN'T come to a conclusion favorable to MS and unfavorable to Linux. Just one. And they won't release the raw data. How much is a large botnet? 10? 100? Among millions of infected MS machines. I would also like to know what this alleged Linux botnet software is called.
I am positive that Linux will not be nearly so adversely affected by users who do not know what they are doing. Linux is very different from Windows and is architected for performance, security, and utility instead of being architected to make someone a boatload of money and maintaining monopoly lock-in. (See the fine the EU just imposed on MS.)
Some technical features which help ensure that even if Linux becomes popular on the desktop it won't suffer the same fate as Windows:
* Linux users don't run as admin/root.
* Email programs do not automatically execute attachments.
* Does not depend on filename extensions for anything.
* Does not auto-run anything from inserted media (Worth a laugh: http://www.foxnews.com/story/0,2933,299155,00.html [foxnews.com] )
* System of mandatory access controls (SE Linux) which really locks things down (some people still turn that off but it is improving rapidly, I use it on my desktop).
* Linux also takes advantage of NX (non-executable memory) which is a recent feature of x86 cpu's
Re: (Score:2, Insightful)
Unfortunately, the admins of the servers will get behind in their patching or just complacent.
Someone I travel to work with got called at 4am one morning by his co-lo with the message "You're box is trying to root all the other boxes in the cages, we're pulling the network cable indefinitely."
It was later determined that he got rooted through a 4 month old SSL vulnerability. The patch was available, he just assumed tha
Re: (Score:2)
Re: (Score:3, Insightful)
The problem is spin (Score:2)
The problem is not in reliability, but in ignorance. Must Linuzzz administrators think they are "inmune" ...
here they all come, out of the woodwork. At first glance this MS spin doctor makes a half-point, but by "Must Linuzzz administrators" El Lobo means most "ubuntu users"*. Anyone using Linux (or hopefully anything with an outward facing IP address) to run public services knows they are not immune and takes appropriate care ... stop drinking the kool-aid for chrisake
* this phrase is not meant to be inflammatory, I use it too :-)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)