LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General
User Name
Password
Linux - General This Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.

Notices


Reply
  Search this Thread
Old 08-15-2020, 09:30 AM   #1
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,361
Blog Entries: 28

Rep: Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148
Russian Drovorub Malware Targeting Linux


Per Bruce Schneier, here's the press release.

An excerpt:

Quote:
Drovorub is a Linux malware toolset consisting of an implant coupled with a kernel module rootkit, a file transfer and port forwarding tool, and a command and control (C2) server. When deployed on a victim machine, Drovorub provides the capability for direct communications with actor-controlled C2 infrastructure; file download and upload capabilities; execution of arbitrary commands; port forwarding of network traffic to other hosts on the network; and implements hiding techniques to evade detection.
 
Old 08-15-2020, 02:16 PM   #2
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
It says implementing secure boot will prevent it from being installed.
Quote:
Implementing SecureBoot in “full” or “thorough” mode should reliably prevent malicious kernel modules, such as the Drovorub kernel module, from loading. This will prevent Drovorub from being able to hide itself on a system.
 
Old 08-15-2020, 07:59 PM   #3
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,361

Original Poster
Blog Entries: 28

Rep: Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148
Nice catch.
 
Old 08-15-2020, 08:59 PM   #4
timl
Member
 
Registered: Jan 2009
Location: Sydney, Australia
Distribution: Fedora,CentOS
Posts: 751

Rep: Reputation: 156Reputation: 156
I suppose my question is...how to enable secure boot? From a trawl around the net (articles from 2015-2017) it is enabled by default is that right? I have to disable it if I don't need/want it?

I am using Fedora 32 but I guess this is a BIOS tweak.
 
Old 08-15-2020, 09:25 PM   #5
teckk
LQ Guru
 
Registered: Oct 2004
Distribution: Arch
Posts: 5,146
Blog Entries: 6

Rep: Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834Reputation: 1834
Quote:
I suppose my question is...how to enable secure boot?
Info:
https://docs.fedoraproject.org/en-US...ide/index.html
https://wiki.archlinux.org/index.php...ce/Secure_Boot
 
1 members found this post helpful.
Old 08-15-2020, 10:13 PM   #6
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,361

Original Poster
Blog Entries: 28

Rep: Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148Reputation: 6148
Just to be clear, one of the reasons I posted this was to combat the myth the Linux is more secure because malware targeting Linux is not in the wild.

Malware targeting Linux is indeed rare, but it is in the wild and precautions must needs be taken.
 
1 members found this post helpful.
Old 08-16-2020, 04:29 AM   #7
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
^ Absolutely.
And it isn't the first time either, but the last time this happened I quickly realised that my browser & OS usage habits would never allow for this malware to become active.

Quote:
Originally Posted by frankbell View Post
I did not know Mr Schneier stooped to simple "aggregation" type articles.
Since he does, the juice is in the comments.
Two things:

1.
Quote:
I personally tune out NSA/FBI announcments because I know there's a meta game going on here. It's about "authority" and marketing and the Russians, quite frankly, are an easy target with their Saint Petersburg crime ecosystem.
(...)
2.
Quote:
The most important piece of information is missing. How does the exploit get loaded into the machine in the first place?
I didn't see very far, but AFAICS it - again - comes down to aquiring superuser privileges - no loading of kernel modules without that.
Prove me wrong.
 
1 members found this post helpful.
Old 08-16-2020, 04:36 AM   #8
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Rep: Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338
I didn't read much, but I did read that a recent kernel mitigated it - 3.7.x was the magic number IIRC.

That doesn't save RHEL on kernels like 2.6.x, but it's ok for distros with 4.x.x or 5.x.x, or is it?
 
Old 08-16-2020, 05:10 AM   #9
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by business_kid View Post
I didn't read much, but I did read that a recent kernel mitigated it - 3.7.x was the magic number IIRC.
Yes, but that would be too easy, wouldn't it. That was ages ago. Even fbi.gov must realise that that would hardly be newsworthy.
Is this the comment:
Quote:
The TL;DR takeaway from the DOD Executive Summary would be :
Quote:
To prevent a system from being susceptible to Drovorub’s hiding and persistence, system administrators should update to Linux Kernel 3.7 or later in order to take full advantage of kernel signing enforcement.
The current Kernel level is 5.8.

Version 3.7 came out back in 2012 or thereabouts, and according to Wikipedia, was the last one to support i386.

So this advice is in practice slightly superfluous.
Quote:
Additionally, system owners are advised to configure systems to load only modules with a valid digital signature making it more difficult for an actor to introduce a malicious kernel module into the system.
Arch Linux lets you do this. But if you're a typical out-of-the-box distro user (e.g., Debian and descendants), this bit is harder to figure out. In any case, I think the typical default use case is to install the distro with UEFI disabled. This is alas the case here, at least on some of the older hardware.

How can you trust kernel developers? And who vetted Torvalds? And what about the long run? Nobody is eternal.

In the "Detection Methodologies" section on p. 36/45, I gather from the statement "Disadvantages: Subject to evasion via TLS or if the format of messages changes." that communication with the C&C server is in plain HTTP. The little five-eyed barnacles on oceanic cables are in a position to feed on any interesting stuff...

From a quick scan of the various links, I didn't see anything about practical infection scenarios, or the nature of the targets.
That last sentence reflects my own impressions.

I am not trying to downplay this, but I want clear information. I won't give in to FUD.
 
Old 08-16-2020, 08:30 AM   #10
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Rep: Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338
Quote:
Originally Posted by ondoho
From a quick scan of the various links, I didn't see anything about practical infection scenarios, or the nature of the targets.
Me neither. From what I know, the Russian cracking outfit seems to be very hot, so this may be the payload rather than the exploit(s) to get in.
 
Old 08-16-2020, 03:16 PM   #11
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
I would really like to see how the malicious kernel modules would get loaded. The administrator would presumably have to be persuaded to do it, but I don't know enough to make informed guesses.
 
Old 08-17-2020, 04:53 AM   #12
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,404

Rep: Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338Reputation: 2338
The kernel autoloads modules for hardware, network stuff, etc. I presume there's an exploit there.
 
Old 08-17-2020, 11:37 AM   #13
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
Yes, of course, but the trick is getting the hacked module onto the drive in the proper location, and the kernel to load it. I would be interested in knowing how that's done. Most exploits rely on humans doing the job, knowingly or unknowingly through bypassing basic security practices.
 
Old 08-17-2020, 02:59 PM   #14
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Fair enough:
Quote:
"The most important piece of information is missing. How does the exploit get loaded into the machine in the first place?"

You forget it's nature and purpose. It is not a network worm.
This is rootkit. Those are planted, manually, after compromising
the system. Even the advisory itself emphasizes on the page 37:

"NOTE:The mitigations that follow are not meant to protect against the initial access vector."

There's a million ways to hack a Linux and getting the root. (*)
and, more succinct:
Quote:
It starts with phishing.
All in all, nothing is eaten as hot as it is cooked.
Yes, Drovorub is real Linux malware, but the argument of GNU/Linux being inherently safer than, say, Windows still applies.

On a more constructive note, I wonder if e.g. Clamav would even find this? Or rkhunter?

(*)Unfortunately that same poster later continues:
You should start the question like this -
How Do I Know That's My Home Ubuntu Is Not Yet Hacked (Owned)?
Are you sure it's not hacked already? How can you be sure?
Today there's no unhackable system and if THEY want to get in,
and THEY have time, resources, knowledge, money etc, THEY
get in. Period.
So actually your first task is to assume that THEY are already IN.
Next step would be find the evidence. That's why this report was
published.

(and worse)
So, FUD after all, with a generous dash of conspiration myth.
 
Old 08-17-2020, 03:29 PM   #15
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
The amount of money and time it would take to get into my personal system is so much larger than the worth of the information that could be gained leads me to believe that THEY don't give a rat's a$$ about my computer. THEY can get everything they need simply by watching my tracks on the internet. But that too is worth less than the time and money it would take. I have no doubt that THEY are logging everything they can about everybody, but as just one ant in the farm I'm not too worried. I do use reasonable care about what I download onto my machine, though.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Hidden Wasp Malware Targeting Linux Ztcoracat Linux - General 2 06-09-2019 06:00 PM
LXer: Orange Pi 3 SBC Now Available, New Malware Targeting Linux Servers to Mine Cryptocurrency, Chrome OS 73 for the Dev Channel Released, LXer Syndicated Linux News 0 01-21-2019 12:42 PM
LXer: 'Less' is more to malware authors targeting Linux users LXer Syndicated Linux News 0 12-01-2014 01:30 AM
LXer: New russian blog "Digged Linux Articles in Russian" LXer Syndicated Linux News 0 07-31-2007 06:16 AM
LXer: Malware targeting Linux on the increase LXer Syndicated Linux News 0 05-08-2006 05:33 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - General

All times are GMT -5. The time now is 06:58 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration