Language Selection

English French German Italian Portuguese Spanish

Security Patches and FUD/Drama

Filed under
Security

This is a Web site issue

New ACBackdoor Malware Targeting Both Linux and Windows Systems

By HackRead

  • Meet ACbackdoor malware targeting Linux and Windows devices [Ed: They call it "backdoor" but it targets machines that are already compromised some other way]

    Furthermore, the Linux variant comes across as more complex with extra capabilities such as process renaming. This is also evident through a search of the Linux binary on VirusTotal where it is detected by only one anti-malware scanning engine whereas the Windows version yielded a significantly higher detection rate of 37/70.

ZDNet: Linux is terrorism

ZDNet meme

ZDNet FUD

More scare-mongering

  • Servers Running Linux May Get Riskier for Enterprises Next Year [Ed: GNU/Linux FUD to increase next year. Or this year. Say people who sell security as a product]

    Enterprises using Linux for their cloud or data center servers may be faced with a larger threat from advanced security attackers in the near future. Based on the Linux Foundation’s estimates back in 2014, 75% of enterprises reported using Linux for the cloud and 79% for application deployments.

ACBbackdoor trojan designed to hit Linux...

  • ACBbackdoor trojan designed to hit Linux and Windows systems

    Intezer Security has found a new backdoor, ACBackdoor, that has no known connection to an operating threat group creating the possibility it could be a harbinger of a new gang’s formation.

    ACBackdoor is primarily a Linux malware, but Intezer has spotted a Windows variant and the company believes it was created by an experienced group of threat actors.

    One piece of evidence pointing toward the ACBackdoor developers being experienced with Linux is that version has a lower detection rate, is written better than the Windows implant, with a higher quality persistence mechanism, along with the different backdoor commands and additional features not seen in the Windows version such as independent process creation and process renaming.

More FUD and More anti-Linux

  • Chinese Hackers Break Into Chrome, Safari, Edge; Reveal Browsers' Vulnerabilities

    Popular vendors received terrible news over the weekend as reports claimed that Chinese hackers were able to exploit vulnerabilities in major browsers, apps, and common utilities. At the recent Tianfu cup held in Chengdu, China, Chinese China's top white-hat hackers have converged in to test zero-days against top software available in the market today. During the first day of the event, Chinese security researchers were able to break into major browsers such as Safari, Microsoft Edge, and Google Chrome.

    Since Mar. 2018, the Chinese government has officially discouraged security researchers from joining hacking competitions outside the county. The recent Tianfu Cup is the venue for hackers to showcase their skills and even earn six-figure bounties for successful exploits. Former Pwn2Own winner Team 360 Vulcan took home $382,500 for successfully hacking the old version of Office 365, Microsoft Edge, Adobe PDF Reader, VMWare Workstation, and gemu+ Ubuntu during the two days event, reports ZDNet.

  • New Roboto botnet emerges targeting Linux servers running Webmin [Ed: ZDNet again goes out of its way to ignore back doors in #proprietarysoftware such as Windows and instead promote the stigma of "Linux" having "back doors" and being super dangerous, courtesy of By Catalin Cimpanu as usual]

Webmin

Again trying to associate "Linux" with "ISIS"

Chrome, Edge, and Safari are not as safe as you might think

  • Your web browsers including Chrome, Edge, and Safari are not as safe as you might think

    Recently, Chrome, Edge, Safari were hacked at a Security event in China named Tianfu Cup. Our lives are being more dependable on digital devices than ever and there’s nothing scarier than the fear of losing your personal information to some third parties. To know about the loopholes of various web browsers a Security-focused event was held at China aimed to exploit various web browsers and to reward the researchers. Various researchers test some hidden loopholes presented within some known apps including Google Chrome, Microsoft Edge and even Apple’s Safari as well as Office 365 and Adobe PDF Reader. Security Researchers were even able to hack these apps and softwar during the contest and earned thousands of dollars in rewards.

More from the same 'script'

  • The awaiting Roboto Botnet

    On August 26, 2019, our 360Netlab Unknown Threat Detection System highlighted a suspicious ELF file (4cd7bcd0960a69500aa80f32762d72bc) and passed along to our researchers to take a closer look, upon further analysis, we determined it is a P2P bot program.

  • Linux Servers Running Webmin App Targeted By DDoS Attacks

    A new botnet named Roboto is targeting Linux servers running Webmin app, according to security researchers at 360 Netlab. Roboto is a peer-to-peer botnet that has been active since summer and is exploiting a vulnerability in the Webmin app. The app offers a web-based remote management system for Linux servers and is installed on as many as 215,000 servers.

    The vulnerability, identified as CVE-2019-15107, allows bad actors to compromise older Webmin servers by running malicious code and gaining root privileges. The vulnerability was identified and patched by the company behind Webmin. However, many users have not installed the latest version with the patch, and Roboto botnet is targeting such servers.

Slashdot joins the drama a week late

NextCloud Linux Servers Targetted by NextCry Ransomware

  • NextCloud Linux Servers Targetted by NextCry Ransomware

    Ransomware hunter and creator of ID Ransomware Michael Gillespie notes that the NextCry ransomware, which is a Python script compiled in a Linux ELF binary utilizing pyInstaller, oddly makes use of Base64 to encode file names in addition to the content material of information which have already been encrypted. Gillespie has additionally confirmed that NextCry encrypts information utilizing the AES algorithm with a 256-bit key.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

7 free GIMP scripts and plug-ins for filters, brushes, textures and more

The free and open source photo-editing program called GIMP (GNU Image Manipulation Program) is a nice alternative to the subscription-based or boxed versions of its competition (including PhotoShop). Whether you’re a beginner with GIMP or a seasoned pro, there’s lots to love. Some of GIMP’s greatest assets are the plugins and scripts created by numerous independent programmers. At one time, there was a massive collection called the GIMP Plugin Registry, but that resource is no longer available. Consequently, you must search the Internet for GIMP plug-ins and scripts. To start you on the right track, we’ve selected our favorite plugins and scripts for you to try, with a brief description of each, and a link to the resource location. First; however, we should explain the complicated process of how to install these treasures and where to find them on the GIMP menus. Read more

Android Leftovers

Get started with Lumina for your Linux desktop

For a good number of years, there was a desktop operating system (OS) based on FreeBSD called PC-BSD. It was intended as an OS for general use, which was noteworthy because BSD development mostly focuses on servers. For most of its life, PC-BSD shipped with the KDE desktop by default, but the more KDE came to depend on Linux-specific technology, the more PC-BSD migrated away from it. PC-BSD became Trident, and its default desktop is Lumina, a collection of widgets written to use the same Qt toolkit that KDE is based upon, running on the Fluxbox window manager. You may find the Lumina desktop in your Linux distribution's software repository or in BSD's ports tree. If you install Lumina and you're already running another desktop, you may find yourself with redundant applications (two PDF readers, two file managers, and so on) because Lumina includes a few integrated applications. If you just want to try the Lumina desktop, you can install a Lumina-based BSD distribution in a virtual machine, such as GNOME Boxes. Read more

Android Leftovers