Language Selection

English French German Italian Portuguese Spanish

Bot attacks Linux and Mac but can't lock down its booty

Filed under
Security

From the department of cosmic justice comes this gem, spotted by researchers from Symantec: a trojan that targets Windows, Mac, and Linux computers contains gaping security vulnerabilities that allow rival criminal gangs to commandeer the infected machines.

Known as Trojan.Jnanabot, or alternately as OSX/Koobface.A or trojan.osx.boonana.a, the bot made waves in October when researchers discovered its Java-based makeup allowed it to attack Mac and Linux machines, not just Windows PCs as is the case with most malware. Once installed, the trojan components are stored in an invisible folder and use strong encryption to keep communications private.

The bot can force its host to take instructions through internet relay chat, perform DDoS attacks, and post fraudulent messages to the victim's Facebook account, among other things.

rest here




More in Tux Machines

Linux Foundation Sysadmins Open-Source Their IT Policies

The Linux Foundation is no stranger to the world of open source and free software -- after all, we are the home of Linux, the world’s most successful free software project. Throughout the Foundation’s history, we have worked not only to promote open-source software, but to spread the collaborative DNA of Linux to new fields in hopes to enable innovation and access for all. Read more

Libreation Of Ireland

The politics of Ireland have been complex but they were using GNU/Linux a lot back in 2008 according to StatCounter but there was a huge drop when “7” emerged. Slowly but surely, GNU/Linux is back in Ireland. Read more

Open Source’s money issue

These past years -and months- we have had several examples how lack of funding can cut a project’s ability to develop, patch and maintain its codebase and by project I mean developers not getting adequate money, if no money at all, for what they do. There is really two sides to the same coin here. There’s the one where an entire industry re-uses entire FOSS stacks or components, sometimes without even acknowledging it licence-wise or even just in name. And there’s the other side, where the same industry will not compensate anyone upstream, because the license terms enables simple reuse and distribution of those software components. Read more

Acer bets on Android gaming with $300 Predator 8 tablet

Is the market ready for an 8-inch slate running Android 5.1 Lollipop designed for gamers? We'll find out starting in November. Read more