LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-08-2016, 06:42 PM   #16
linuxStudent11
Member
 
Registered: Jun 2007
Posts: 164

Rep: Reputation: 18

Whew, I guess I'm ok then. I'm sitting IN FRONT of the keyboard.
 
Old 03-08-2016, 10:47 PM   #17
linuxStudent11
Member
 
Registered: Jun 2007
Posts: 164

Rep: Reputation: 18
BTW: Does anyone know if chkrootkit or rkhunter or debcheckroot or ... can detect any of the popular ransomeware (probably never been on linux but these are likely to run on OSx)?
And since ransomware is almost certainly user-space, what about configuring tripwire to check userspace?
It seems like a good idea to think about this since the latest ransomware sits around for 2-3 days before it starts encrypting user files. Maybe its really vulnerable at that point?

Last edited by linuxStudent11; 03-08-2016 at 10:49 PM.
 
Old 03-09-2016, 12:19 PM   #18
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,633
Blog Entries: 4

Rep: Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931Reputation: 3931
I do find it interesting that the ransomware almost-certainly must have been signed by a developer key. It suggests an inside job.
 
Old 03-09-2016, 12:25 PM   #19
schneidz
LQ Guru
 
Registered: May 2005
Location: boston, usa
Distribution: fedora-35
Posts: 5,313

Rep: Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918
pebkac
 
Old 03-09-2016, 12:29 PM   #20
schneidz
LQ Guru
 
Registered: May 2005
Location: boston, usa
Distribution: fedora-35
Posts: 5,313

Rep: Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918
Quote:
Originally Posted by sundialsvcs View Post
One of the reasons why I use OS/X as a host is ... Time Machine. Which comes free with OS/X.

(Some versions of Windows have a comparable utility, but it's really not "comparable" at all ..)[/i]

Working quietly in the background, every hour or more-often, TM backs up everything, including e-mails.

I'd be very interested in recommendations for a Linux based backup daemon that can do equivalent things. I'd happily dedicate a second external hard-drive to backing up several Linux VM's.
dd ?
(i guess rsync is usually recommended for incremental backups but i never had the need and therefore no experience with it).
 
Old 03-09-2016, 02:20 PM   #21
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
Rsync running through a cronjob should certainly be able to do the backups. That's what it's designed for.
 
Old 03-10-2016, 12:49 AM   #22
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Wrt defense please note the infection vectors mentioned are just that: exploit any flaw, elevate privileges, do stuff. And the fact that linux.encoder.1 currently is easily defeated also is no reason to postpone getting that security posture up to spec. As far as I'm concerned all common security best practices (install and expose only what is required, proper hardening and auditing, regular updates and backups etc, etc) still apply. Do note unattended, automated backups without restore testing or content checking may prove to be interesting because for the backup software itself there's no valid reason not to back up an already ransomware-encrypted file system ;-p
 
Old 03-10-2016, 03:34 AM   #23
ReaperX7
LQ Guru
 
Registered: Jul 2011
Location: California
Distribution: Slackware64-15.0 Multilib
Posts: 6,558
Blog Entries: 15

Rep: Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097
Quote:
Originally Posted by Emerson View Post
This, ladies and germs, is BS. MS Windows cannot be secured, too many security holes. When you buy a Windows penetration kit from bad guys it comes with 6 months warranty. In unlikely case MS closes the security hole your kit is exploiting they switch you over to next vulnerability for free. Unthinkable with any POSIX compliant system.
Out of the box, that may be true, but with the right packages added to a Windows system, it can be secured to a fair reasonable level.

- Finely tuned permission levels for software and hardware can limit exposure to malware. Example: Limiting USB drive access, or access to optical or flash drives in the system.
- Properly updated systems reduce security holes as do tested antimalware tools. Example: Using MalwareBytes Pro in conjunction with Sophos Internet Security.
- Blocking bad IP addresses in the HOSTS can reduce instances of exposure. Example: Running Spybot Search and Destroy's Immunization tool can tune up security and create a huge block list in HOSTS.
- Using well tuned and properly configured Stareful Packet Filtering Firewalls in both hardware and software can reduce threats as well as using software to warn of attacks on the system and network.

GNU/Linux equally has to be properly secured by the system administrator as well. No operating system is going to be 100% fail safe. Apple claimed this with OSX/Darwin, and it got very devastating malware. Now OSX has several malware detection and elimination tools to keep the system safe. Linux systems can get malware, but because no two distributions are exactly alike, attacking every system equally is impossible.
 
Old 03-10-2016, 01:06 PM   #24
linuxStudent11
Member
 
Registered: Jun 2007
Posts: 164

Rep: Reputation: 18
Quote:
Originally Posted by sundialsvcs View Post
I do find it interesting that the ransomware almost-certainly must have been signed by a developer key. It suggests an inside job.
Another possibility is what happened to Ian Murdock. When he was "clubbed to death", the PD got control of his laptop. The FBI showed up later on ulterior motives.
Sorry for the conspiracy theories here, but does the SFPD now have his keys? Does this imply the FBI has his keys?
And by the same argument, did someone else get Apple keys from a traffic stop, drug deal, vindictive girl friend, etc. etc.? And if you're talking about transmission bittorent developers, same logic.
Old adage: No man is an island.

Last edited by linuxStudent11; 03-10-2016 at 01:07 PM.
 
1 members found this post helpful.
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Third try is no charm for failed Linux ransomware creators LXer Syndicated Linux News 0 01-06-2016 10:01 PM
Ransomware now targetting Linux servers Kropotkin Linux - Security 6 11-15-2015 11:51 AM
LXer: First Linux ransomware program cracked, for now LXer Syndicated Linux News 0 11-10-2015 10:10 AM
LXer: New encryption ransomware targets Linux systems LXer Syndicated Linux News 0 11-10-2015 03:40 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:58 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration