New Linux Trojan Can Spy on Users by Taking Screenshots and Recording Audio (drweb.com) 130
An anonymous reader writes: Dr.Web, a Russian antivirus maker, has detected a new threat against Linux users: the Linux.Ekoms.1 trojan. It includes functionality that allows it to take screenshots and record audio. While the screenshot activity is working just fine, Dr.Web says the trojan's audio recording feature has not been turned on, despite being included in the malware's source code. "All information transmitted between the server and Linux.Ekoms.1 is encrypted. The encryption is initially performed using the public key; and the decryption is executed by implementing the RSA_public_decrypt function to the received data. The Trojan exchanges data with the server using AbNetworkMessage."
And it's easy to get infected without realizing it (Score:5, Funny)
Simply download the package and run these steps:
1. tar xzf trojan.tar.gz ./configure
2. cd trojan
3.
4. make
5. sudo make install
Re:And it's easy to get infected without realizing (Score:5, Funny)
Simply download the package and run these steps:
It doesn't build with my version of libc. Is there a wiki or forum, or something?
Re: (Score:1)
TODO
-Ncurses support
Re: And it's easy to get infected without realizin (Score:5, Funny)
I don't think it runs on anything except a 5 year old ubuntu with default setup and you need to kill pulseaudio + make sure your microphone is alsa device 0:1 for the experimental recording function. Also try disabling compositing, if your screenshots only show the desktop background.
You might have to create the certs for the encrypted uploads manually if the system isn't getting enough entropy fast enough or the Trojan will assume that the connection timed out and go into an endless loop.
Just run the Windows version with wine until the devs get their shit together!
Re: (Score:3)
Re: (Score:2)
Then, when the unsuspected owner returns from taking a piss, target is p0wned*. Enjoy!
* support up to Android 2.1 only
Re: (Score:2)
This kind of information TOTALLY USELESS unless the fear mongers in question actually tell us how this thing gets on a system. That's very important because it tells us how to AVOID this stuff. That's the whole point of ANY sort of problem report even if you're just talking about an unsupported printer.
Vague accusations are of no use to anyone except trolls.
How do you defend against this? How do you fix whatever security hole it's using?
The nature of the infection vector is really the only bit of relevant i
Re: (Score:2)
Re: (Score:2)
I don't see any mention of a securty hole at all, do you?
Likely it's a trojan that runs if you install it first (after typing in your sudo password).
That's generally how things work on Linux.
Re: (Score:2)
How do you defend against this? How do you fix whatever security hole it's using?
The answer to both of these questions is the same. Buy our (not mine personally, the people who put out this report) antimalware software.
Re: (Score:2)
Nah, easier to download and install the compiled binary package. No compile stuff.
Re: (Score:1)
Re: And it's easy to get infected without realizin (Score:1)
Windows has a convenient feature where it will download AND run the Trojan for you.
There was a Linux kernel vulnerability announced yesterday... Ubuntu had the patch available by the time I got out of work. Phones, on the other hand are Phucked.
Re: (Score:2)
oh, I already got infected with the ./configure step
Malware did not install as root, did not need to. Just took all my thunderbird adresses and mailed all my contacts to try this awesome software.
back in the old days (Score:5, Funny)
Linux didn't support my laptop's webcam.
Re: (Score:3, Funny)
That's a common misconception about systemd: just run `systemctl stop malwared` and you'll be all sorted.
Re: (Score:2, Insightful)
What sort of mouth breathing moron can't reinstall windows and get a few drivers organised without the recovery image? I've been doing just that for years and it really is very easy.
And if you can't handle a windows install, why on earth are you futzing around with trying to install Linux.
Slashdot users these days ....
Re: (Score:2)
Well if windows doesn't work without the recovery image, whats the problem with linux?
The recovery image contains a specially tuned version of windows for the specific hardware, your complaining that you cant install a generic version of linux and have everything work immediately while also complaining that a generic version of windows doesn't work immediately? If you had a specially tuned version of linux for the hardware then it would run without problems too.
Re: (Score:2)
Wah! Wah! Wah!
I wiped out my Windows partition and it was too hard to install again. Linux must be to blame!
Mebbe you shouldn't have told the Linux installer to wipe everything.
shocked, shocked i say! (Score:5, Informative)
Dr.Web malware specialists have not disclosed how this malware infects Linux computers.
But they are willing to sell you their Linux antivirus software.
From what I've gathered, it's written in C++, uses Qt 5.4 or higher (that's when the enumeration value QStandardPaths::GenericDataLocation was added to Qt) and it's not self-propagating.
So basically, it's a program that has to be installed on your computer... maybe from a compromised package repo server.
Re: (Score:1)
A system cannot be compromised from a hacked repo. The packages are signed.
Re: (Score:1)
It makes little difference. Look how long Debian went down after a single dev account was compromised. The system is only as secure as its weakest element.
Re:shocked, shocked i say! (Score:4, Insightful)
Key point being "went down", rather than pose any risk to their users they decided to shut everything down until they could properly investigate the breach.
Any commercial business would want to be back up and running again as soon as possible, even if that meant cutting corners.
Re: (Score:2)
It makes little difference. Look how long Debian went down after a single dev account was compromised. The system is only as secure as its weakest element.
Almost always, the weakest point in any computer chain is a human.
A signed package management system adds security if you can
a) verify that the signer is who he says he is, and not merely someone who has obtained a signing key, and
b) can be trusted, and
c) isn't a rubberstamper.
in reality, people go "oh, signed, cool!", and don't think about it. If there are ten admins working for a repo, and a couple of sysadmins, and an unknown number of past workers who may or may not hold grudges, do you really want to
Re: (Score:2, Insightful)
And this is why these companies use scary announcements. Most people will not understand it's a non-event. They just see the headline and panic. The media also are unskilled (that's why they're reporters and not real developers or engineers). But they know roughly what keywords mean and try to create tech-articles based on anything that'll draw in clicks, or fuel forum/comment rage. You'll find the same issue in every field. My wife is always showing similar crap regarding medical scares.
Re:shocked, shocked i say! (Score:5, Interesting)
Personal experience is that the applications shipped by the distro to do these tasks crash a lot, hang the desktop, fight with pulseaudio or require extensive configuration (hello ~/.alsasoundrc and 2005!)
About a month ago my Debian desktop was compromised, and I figured this out because the desktop was hung. In an attempt to recover the hang, I tried to restart Gnome Shell... and I started getting audio in a foreign language of people speaking. I freaked out, shutdown my computer, and reinstalled.
I'm generally careful about not installing fishy stuff, and I saved a copy of the hard drive after I shut it down, so if somebody wants to help see what it was I'd be willing to work with them.
Re:shocked, shocked i say! (Score:5, Funny)
I tried to restart Gnome Shell... and I started getting audio in a foreign language of people speaking.
You fool. We finally found someone who was able to get remote audio working on Linux and you hung up on them!
Re: (Score:2)
Just to be sure: were you or someone in your home perhaps watching foreign films on the web before this happened?
No, and I'm the only person who runs any kind of Linux in the house. It was clearly too people speaking conversationally, coming through loud and clear on my PC speakers, with background home noises. I wish I had recorded some of the conversation before shutting it down, but I freaked out.
Re: (Score:2)
For $20 btc I can sell you the secret to removing it from your system. Wallet 3J98t1WpEZ73CNmQviecrnyiWrnqRhWNLy I'll surely send you the info.
haha (Score:4, Funny)
Jokes on them, my headless Linux box doesn't have a microphone. I will go back to playing my xbox1 on my Samsung tv while asking Siri for game pointers...
Re: (Score:2)
There is no way that this malware is going to be in usr or opt without having a root priv install so and it cannot access or modify etc unless you installed it as root.
People routinely install stuff with sudo, so if it's a trojan it was probably installed as root. Furthermore, privilege escalation bugs are quite common. I just did a search for: linux privilege escalation bug, and the top hit was a news item less than a day old:
http://www.darkreading.com/vul... [darkreading.com]
Tens of millions of Linux PCs and servers and 66% of all Android devices are impacted by a vulnerability in the Linux kernel that allows privilege escalation from local to root via a use-after-free attack, according to the research team at Perception Point.
Although no exploits for the bug have been seen in the wild yet, the vulnerability is far-reaching. According to Yevgeny Pats, co-founder and CEO of Perception Point, the bug affects all Linux kernels from release 3.8 and later, both 32-bit and 64-bit, operating on desktop, server, mobile, and embedded devices.
The vulnerability, CVE-2016-0728, is a reference leak in the keyrings facility, where security data like encryption keys and authentication keys are stored.
Re:So what I get from TFA... (Score:4, Interesting)
there, upload that! Honestly I didn't even see the directory .mozilla/firefox/profiled on my machine.
Yeah buddy we could have fun with that, you want data, how about a couple Gb of /dev/random!
Microphone? (Score:2)
Despite the presence of an audio recording feature in its codebase, Dr.Web says that this functionality was never active in the trojan's normal operation.
Now I lost any hope my microphone will ever work. If even hackers have a hard time ...
Every cloud (Score:5, Funny)
Wait, so someone has found a way to make audio work reliably across Linux distros? Does this make 2016 the Year of the Linux Desktop?
Re: (Score:2)
> Along with the ability of screenshot taking, the Trojan has the AbAudioCapture special class to record sound and save it with the name of aa-%d-%s.aat in the WAV format. However, in fact, this feature is not used anywhere.
That's an entertaining thought but it looks like they didn't get it working at all
Re: (Score:2)
Wait, so someone has found a way to make audio work reliably across Linux distros?
Kubuntu audio has worked reliably since somewhere between version 9.10 and 10.04 (I'm not certain which). I think that's where Kubuntu got Pulse Audio finally installed correctly.
Does this make 2016 the Year of the Linux Desktop?
My customers (who vary in range from late 20's to early 70's) have been happily using Kubuntu desktops since the 2008 timeframe. Most reactions have included a variation of surprise that computers can work so well (once I turn off the brain damage that is desktop search).
Re: (Score:1)
Re: (Score:1, Redundant)
Rootkits (Score:2)
Linux rootkits have been around for many years, and there is already standard functionality for taking screenshots and recording audio built in to most linux distros.. You can just dd data from /dev/audio to a file, and you can take screenshots using xwd or import. The only difference is that most linux systems are servers or embedded so they usually don't have X11 running or any audio hardware attached.
Re: (Score:2)
The fact that there's no likely mechanism for a Linux user to acquire such a trojan is a much more important difference. On the very rare occasions I install something from outside the repositories, it'll be carefully vetted.
Re: (Score:2)
That's a bug tracker, and it makes no mention of the ekoms trojan (which i'm sure someone would have filed as a severe bug if they had found it)...
I can also find no mention of the default ubuntu or mint packages shipping with this trojan.
Although obviously you are right in refuting the parent posts's notion that there is no way for the trojan to get onto the system, it may be far less likely for malware to make its way onto a linux host but it's obviously not impossible. Linux has (and has for many years)
Malware's source code (Score:5, Funny)
Well of course the source code is provided, no Linux user is going to install something without first knowing what it does!
Re: (Score:1)
Where can I submit a bug report? (Score:4, Funny)
This trojan doesnt work with pulseaudio..... well technically NOTHING works with pulseaudio.
So I want them to write and push out a patch so it will work with not just ALSA but the other 657 different audio interface API's.
A new threat against Linux users? (Score:1)
Something seems fishy (Score:2)
I (maybe shockingly) actually read the page.
FTP
~
EkomsCcClient:
It generates a filtering list for the "aa*.aat", "dd*ddt", "kk*kkt", "ss*sst” files that are searched in the temporary location and uploads the files that match these criteria to the server. If the answer is the uninstall line, Linux.Ekoms.1 downloads the /tmp/ccXXXXXX.exe executable file from the server, saves it to the temporary folder and runs it.
~
Last time I check unless you are running Wine, ccXXXXXX.exe will not execute in linux or ha
Re: (Score:2)
Where does it say that ccXXXXXX.exe is a windows binary?
You can rename linux binaries to have a .exe prefix and they still run
Re: (Score:2)
True but not typical for linux, that is what made me question it.
Re: (Score:1)
Calling it an 'executable binary' named
Re: (Score:2)
It's been a while since I have even thought about this but I always understood that the file extension really didn't mean anything in linux, if the x bit was set then bash either sent it to the correct interpreter depending on the shebang or executed it depending on the correct magic number in the binary.
On xterm too? (Score:2)
On xterm too?
Old school here. I access our Unix-like systems exclusively using Cygwin terminal which emulates xterm. At home I have Mac OS and FreeBSD. The latter one is a file server which I access mostly though a terminal.
Curing recommendations (Score:1)
How about 'kill -9 PID'
BTW: Anyone notice it also 'downloads the
Don't think drweb knows enough about *nix to even explain what it does.
Re: (Score:1)
GPL? (Score:1)
WTF?!? (Score:1)
Wayland? (Score:2)
Wayland doesn't allow this behavior so probably such a trojan wouldn't be possible with Wayland (outside of the audio aspect that is).
Re:Stupid users (Score:5, Funny)
but why did they make a new name for it? "teamviewer" is much easier to remember.
Re: (Score:2)
Re: (Score:2)
you need to google teamviewer. it's the most widely spread backdoor in the world. (on gnu/linux it runs as a background daemon even if you don't manually turn it on. it does not (easily) let you disable the daemon and use it ad hoc. on OS X, you can't even uninstall it without leaving crap behind)
Re:Stupid users (Score:5, Insightful)
Re:Stupid users (Score:5, Insightful)
Re: (Score:2)
Re:Stupid users (Score:4, Informative)
Re: (Score:2)
What I can't understand is why someone who apparently knows everything already should trouble to read a forum such as Slashdot - let alone comment, and abuse those who do not enjoy their educational advantages.
If Slashdot isn't a place where people can discuss matters in a calm, civilized way, and learn from each other, what is it? (That's a rhetorical question, by the way).
Re: (Score:2)
If Slashdot isn't a place where people can discuss matters in a calm, civilized way, and learn from each other, what is it? (That's a rhetorical question, by the way).
Thanks. I needed a good laugh!
Re: (Score:3, Informative)
has detected a new threat against Linux users
What, all twelve of them?
I suppose you are using a windows phone or surface rt and are puzzled as to why there are more Linux users in the world than WP OS and WInRT users combined? I give the guys at DrWeb credit for trying to make money from us skin flint Linux users. Considering the fact that Mint Linux is starting to really catch on and has more users than WP OS and Surface RT users combined and it is only one distro that has millions of users. The fact that old computers and laptops are easily made to efficiently work by the m
Re: (Score:1)
Re: oh noes (Score:4, Funny)
Oh, Wait ...