"Researchers have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world."
"Now researchers from Moscow-based Kaspersky Lab have detected Linux-based malware used in the same campaign."
Just you wait until APTs start becoming common on tablets smartphones and routers. No UI (in fact no admin rights) that could be used to reveal the malware. Always on LTE connection doing who knows what with no connection logs to read, or logs compromised (the router infection). As stealthy as they have gotten on full blown OS installs they pale in comparison to the possibility of the sheer pervasiveness of APTs running on other devices.
Remember, almost everything now is a computer and runs some sort of OS far more capable than the UI the device is presenting to the user.
Don't worry, the post ended soon after that, so you got the gist of it. But if you're interested, here's what was said after 'Moscow-based'
>-Kaspersky Lab have detected Linux-based malware used in the same campaign."
B T F O
ⓁⓄⓄⓃⒾⓍ ⓊⓈⒺⓇⓈ ⒷⓁⓄⓌⓃ ⓉⒽⒺ ⒻⓊⒸⓀ ⓄⓊⓉ
YOU HAVE BEEN
>new viruses for Windows discovered daily
>a single virus for Linux discovered
If anything, this only demonstrates what security experts have said all along. The commonly held belief that Windows only gets more viruses than other systems because of its wide adaptation is wrong because it ignores the fact that almost all of the highest value targets out there run Linux. If you want grandma's social security number you write a virus for Windows. If you want state and corporate secrets, websites' user data, or to compromise a business or government in any way, you write a virus for Linux. And yet, almost none exist. The article fails to mention how this malware spreads. The term "Trojan" usually means that it tries to disguise itself as something else and you have to install it and run it yourself for it to work. So, you can install software for Linux that does bad things. Shocking.
Linux already has solutions built in.
Boot Linux from read-only media and reboot often. No trojan can stay in your system because the OS is refreshed with each reboot.
Use the "toram" cheatcode on Knoppix, for example, and the whole OS will boot to RAM and be delightfully fast.
You can make custom live boot images from an OS installed elsewhere and kept off line by using tools like remastersys. Of course Knoppix can remaster itself so there's always that.
All the above examples have been available for a long time and there are more ways to go about it than I listed.
Have some Gentoo options, then go back to your gloryhole so you won't be late for dinner!
>driving my bmw on the interstate
>get a flat tire
>pull over and begin installing spare
>windows pleb drives by
>all tires gone, rolling on bare metal making sparks
>front wind shield cracked, rear window smashed
>rear right door's window won't close all the way up, left door's completely gone
>stops rights beside me, blocking a lane
>yells "haha! enjoy your flat tire faggot!"
>drives away, huge oil stain where his car was
hope you liked my analogy for this thread
You can do it far more easily with Linux.
Show us a fully capable Windows OS that can boot and run from read-only media. OS X being Unix-like should be able to do this, but OS X is crippled to only run on Apple platforms unless hacked.
Keep trolling, boy.
More like your bmw is pic related, possibly self made, you kinda understand the basics of how it works, but its a piece of shit in general that never worked correctly. It did the job, half assed but it did, you had no problem as you had all the time in the world for it.
Meanwhile the wangblows was at some point a camry, possibly with the infamous pedal recall but it worked far better than yours. It just worked and hell it will keep working as good or better than yours no matter what.
Basically both are shit and youre a faggot.
Why would you boot from read-only media when you could just load the entire OS into RAM
More like it's a danger to its user and everyone else on the road
>n-no it's not like that!
If your OS is not Linux it's either a horribly engineered piece of shit or the user base is so small that it's not worth using. Deal with it, monkey.
>Linux already has solutions built in.
>Boot Linux from read-only media and reboot often. No trojan can stay in your system because the OS is refreshed with each reboot.
>implying linux users reboot their computers at all because "MAH UPTIMES".
>The article fails to mention how this malware spreads. The term "Trojan" usually means that it tries to disguise itself as something else and you have to install it and run it yourself for it to work.
It's essentially a normal user mode libpcap program that listens for packets and if a particular sequence of packets is detected (on any arbitrary port/service) then it starts a listening socket for remote commands.
That is the magical 'stealth' mode. (Based on this: http://www.phenoelit.org/stuff/cd00r.c)
In other words, it's fucking nothing.
does anyone know what packages are known to be infected?
why would they release info on a linux trojan but leave people in the dark as to how you actually get the fucking thing
makes no sense
clonezilla seems suspicious to me because of that "tiwan labs" shit
but this is definitely not a confirmed source for this
if anyone can chime in with some real info, that would be helpful
"Linux doesn't have things like virii and trojanz"
~All Linsux Lusers All Times
I got so sick of hearing your sperg linux crap, just because you couldn't afford Windows for decades. Good enough for yas.
Captcha: win yentyl
The malware in the OP is also apparently state-sponsored, so the post that that one is replying to is completely wrong about the fact that this sort of thing doesn't happen with Windows.
The article supplies no means of allowing the reader to verify whether the virus in installed on their computer and it only serves to induce FEAR and PARANOIA in the reader, effectively driving them away from using dis lonox fing dat evy1 tokin abot. Nothing about the virus being on your computer, not being on your computer, or being/not being on some other computer that you might care about can be learned from it.
This is why it's well suited for this board, because there are lots of anxious and paranoid people here. :-)
this is not practical for people with multiple SSD's
even with dd image clones it would still be time consuming as fuck
plus hdd firmware too
but the hdd firmware roots are all NSA shit, and you can trust them