LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-29-2016, 05:40 PM   #1
drmjh
Member
 
Registered: Mar 2005
Location: North Carolina, USA
Distribution: Ubuntu
Posts: 308

Rep: Reputation: 31
Is Linux susceptible to Ransomware ?


I understand that there exists a linux version of ransomware.
What protection is the community suggesting?
Matthew
 
Old 02-29-2016, 07:04 PM   #2
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,661

Rep: Reputation: Disabled
There is? I remember I heard it was a Windows virus that encrypted shared drive from Linux, so it really wasn't running on Linux.
 
Old 02-29-2016, 07:37 PM   #3
drmjh
Member
 
Registered: Mar 2005
Location: North Carolina, USA
Distribution: Ubuntu
Posts: 308

Original Poster
Rep: Reputation: 31
Thanks!
That makes more sense to me now.
Matthew
 
Old 02-29-2016, 07:41 PM   #4
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,241

Rep: Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322
Quote:
Originally Posted by drmjh View Post
I understand that there exists a linux version of ransomware.
What protection is the community suggesting?
Matthew
The traditional advice is to not give your user account write access to everything. I understand that may not be realistic these days, but it's still the right way to do it.
 
Old 02-29-2016, 09:25 PM   #5
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,345
Blog Entries: 28

Rep: Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145Reputation: 6145
There was an attempt to use ransomware against Linux last year. Its specific target was the Magento e-commerce platform, rather than Linux itself. By all reports it was lame and easily defeated. http://www.zdnet.com/article/how-to-...er-ransomware/

There's also an relatively new exploit that attacks WordPress. The story I read did not go deeply enough to describe how it found entry to a WP instance, but, in the past, most exploits that attack WP do so through dodgy plugins.

http://www.theregister.co.uk/2016/02...king_websites/

Generally, Linux's security model is excellent, but it's not an invisible plastic shield. Regardless of the OS, users must practice safe HEX.
 
1 members found this post helpful.
Old 02-29-2016, 10:29 PM   #6
John VV
LQ Muse
 
Registered: Aug 2005
Location: A2 area Mi.
Posts: 17,627

Rep: Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651Reputation: 2651
linux is NOT invincible

and believe it or not but you can also make MS Windows JUST as secure

there are however a lot less threats , but they DO exist .

not just the wordpress issue

i will need to find it but i recently ( last 2 months or so ) read about a version of a cryptolocker-ransomware that WAS working on linux and on ext3 and 4 partitions

There was ALSO a VERY FUNNY!!!! story about SCRIPT-KIDDES infecting THEMSELVES with a " LINUX keyloger" that had the source released on a onion site.
-- linked to from 4chan i think


there IS a reason that drives that are auto mounted are READ ONLY to a normal user

if your back-up drive is WRITABLE by a normal user then it COULD get locked up
 
Old 02-29-2016, 10:48 PM   #7
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,661

Rep: Reputation: Disabled
Quote:
Originally Posted by John VV View Post
and believe it or not but you can also make MS Windows JUST as secure
This, ladies and germs, is BS. MS Windows cannot be secured, too many security holes. When you buy a Windows penetration kit from bad guys it comes with 6 months warranty. In unlikely case MS closes the security hole your kit is exploiting they switch you over to next vulnerability for free. Unthinkable with any POSIX compliant system.
 
Old 03-01-2016, 11:44 AM   #8
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
The best defense against ransomware, on any OS, is regular backups, preferably daily. If your business depends on having everything, then you should be doing backups of your data more frequently. Those backups should be going to an external drive at least, if not to cloud or network storage. All you have to do to defeat the ransomware is to reinstall your backup. You may lose some changes, but that's all.
 
Old 03-02-2016, 03:52 AM   #9
dugan
LQ Guru
 
Registered: Nov 2003
Location: Canada
Distribution: distro hopper
Posts: 11,241

Rep: Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322Reputation: 5322
Quote:
Originally Posted by sgosnell View Post
Those backups should be going to an external drive at least, if not to cloud or network storage.
And if you do back up to cloud or network storage, remember what I said about permissions. It's extremely common to have cloud/network storage mounted with user-write permissions for convenience. Get ransomware on a setup like that, and you'll lose the backups.
 
Old 03-04-2016, 09:05 AM   #10
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,671
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
One of the reasons why I use OS/X as a host is ... Time Machine. Which comes free with OS/X.

(Some versions of Windows have a comparable utility, but it's really not "comparable" at all ..)[/i]

Working quietly in the background, every hour or more-often, TM backs up everything, including e-mails.

I'd be very interested in recommendations for a Linux based backup daemon that can do equivalent things. I'd happily dedicate a second external hard-drive to backing up several Linux VM's.
 
Old 03-07-2016, 10:54 AM   #11
linuxStudent11
Member
 
Registered: Jun 2007
Posts: 164

Rep: Reputation: 18
What would be the standard linux defenses/recovery choices?
I would think a properly configured apparmor/selinux setup would work well. Has anyone built config packages for either of those specific to ransomeware?
Signature detection is always a problem but hitting a violation-count threshold for such a package could work well I would think.
Then there's booting from a rescue thumbdrive to examine logs and kill things and replace with backups.
I'm sure others have better/more ideas.
 
Old 03-07-2016, 11:15 AM   #12
ugjka
Member
 
Registered: May 2015
Location: Latvia
Distribution: Arch, Centos
Posts: 368
Blog Entries: 5

Rep: Reputation: 264Reputation: 264Reputation: 264
Quote:
Originally Posted by linuxStudent11 View Post
What would be the standard linux defenses choices?
Don't run dodgy scripts?
 
Old 03-07-2016, 03:57 PM   #13
linuxStudent11
Member
 
Registered: Jun 2007
Posts: 164

Rep: Reputation: 18
...most of the bash scripts I write are "dodgy" :P
But thanks.
 
Old 03-08-2016, 02:37 PM   #14
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Moderator response

Moved: This thread is more suitable in <Linux - Security> and has been moved accordingly to help your thread/question get the exposure it deserves.
 
Old 03-08-2016, 03:39 PM   #15
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Any OS is only as Secure as the nut behind the keyboard.
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Third try is no charm for failed Linux ransomware creators LXer Syndicated Linux News 0 01-06-2016 10:01 PM
Ransomware now targetting Linux servers Kropotkin Linux - Security 6 11-15-2015 11:51 AM
LXer: First Linux ransomware program cracked, for now LXer Syndicated Linux News 0 11-10-2015 10:10 AM
LXer: New encryption ransomware targets Linux systems LXer Syndicated Linux News 0 11-10-2015 03:40 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:36 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration