LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-18-2015, 04:28 PM   #1
fogpipe
Member
 
Registered: Mar 2011
Distribution: Slackware 64 -current,
Posts: 550

Rep: Reputation: 196Reputation: 196
NSA sponsored crackers have infected harddrive firmware for 14 years


http://arstechnica.com/security/2015...found-at-last/

The article (as far as i have gotten) seems to be focused on windows. Anyone know what this means, or how successful the same methods might be, for linux?

Quote:
In addition to planting exploits on the websites, the attack code was also transmitted through ad networks. The wide range of exploit carriers may explain why so many of the machines Kaspersky observed reporting to its sinkholes were domain controllers, data warehouses, website hosts, and other types of servers. Equation Group, it seems, wasn't infecting only end user computers—it was also booby-trapping servers known to be accessed by targeted end users.
Yikes!

Last edited by fogpipe; 02-18-2015 at 04:31 PM.
 
Old 02-18-2015, 04:45 PM   #2
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Yes, "Yikes!" indeed.
 
Old 02-18-2015, 05:50 PM   #3
Miati
Member
 
Registered: Dec 2014
Distribution: Linux Mint 17.*
Posts: 326

Rep: Reputation: 106Reputation: 106
Quote:
Originally Posted by fogpipe View Post
http://arstechnica.com/security/2015...found-at-last/

The article (as far as i have gotten) seems to be focused on windows. Anyone know what this means, or how successful the same methods might be, for linux?



Yikes!
Quote:
The CD from the 2009 Houston conference—which Kaspersky declined to identify, except to say it was related to science—tried to use the autorun.inf mechanism in Windows to install malware dubbed DoubleFantasy.
autorun.inf, of course.
Windows in admin is akin to Linux in root.
If you ran a linux virus from a cd as root, you can easily be infected.

If you follow the "normal" practice of doing 99% of stuff as a normal user, this would be contained within a users ~/ directory.
Bad, but won't compromise a system.

Quote:
By embedding malicious code inside the .LNK files, a booby-trapped stick could automatically infect the connected computer even when its autorun feature was turned off.
Again, don't run stuff as root.

Last edited by Miati; 02-18-2015 at 05:53 PM.
 
Old 02-20-2015, 06:34 AM   #4
fogpipe
Member
 
Registered: Mar 2011
Distribution: Slackware 64 -current,
Posts: 550

Original Poster
Rep: Reputation: 196Reputation: 196
Quote:
Originally Posted by Miati View Post


Again, don't run stuff as root.
If the article is correct, and they have control of the hd firmware, at the file system level, and the malware loads with, or before, the os, im not sure root matters any more.

This is a diagram of how the malware loads in windows, note that the malware loads before the os loader:

http://cdn.arstechnica.net/wp-conten...boot-steps.png
 
Old 02-20-2015, 12:34 PM   #5
veerain
Senior Member
 
Registered: Mar 2005
Location: Earth bound to Helios
Distribution: Custom
Posts: 2,524

Rep: Reputation: 319Reputation: 319Reputation: 319Reputation: 319
With open source you know what your system is processing using cpu. Who knows what's inside the processor and any other hardware. For national security every chip/hw may be bugged. Can a user find out what's in them. And we try to improve the security of softwares very hard(perhaps not).
 
Old 02-20-2015, 06:49 PM   #6
Miati
Member
 
Registered: Dec 2014
Distribution: Linux Mint 17.*
Posts: 326

Rep: Reputation: 106Reputation: 106
Quote:
Originally Posted by fogpipe View Post
If the article is correct, and they have control of the hd firmware, at the file system level, and the malware loads with, or before, the os, im not sure root matters any more.

This is a diagram of how the malware loads in windows, note that the malware loads before the os loader:

http://cdn.arstechnica.net/wp-conten...boot-steps.png
True. I guess what I'm saying is don't let it get to that point. At some point it needs the permission to install the malware. If you permit it (admin in MS makes that easy) then it doesn't matter what os you use.
 
Old 02-20-2015, 09:01 PM   #7
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,982

Rep: Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626
I think I'd need to see some proof of this.

I am sure however that there are many spies in the world on every side. There are countless crooks too that have only their own agenda.

My favorite device was still the art object Russia had in the US Embassy.
 
Old 02-21-2015, 01:29 PM   #8
LinuxUser42
Member
 
Registered: Nov 2010
Distribution: Lubuntu, Raspbian, Openelec, messing with others.
Posts: 143

Rep: Reputation: 19
Quote:
Originally Posted by veerain View Post
With open source you know what your system is processing using cpu. Who knows what's inside the processor and any other hardware. For national security every chip/hw may be bugged. Can a user find out what's in them. And we try to improve the security of softwares very hard(perhaps not).
I would think that is part of why the various open bios projects came into being. People want to know what their computers are doing on a hardware level.
 
Old 04-12-2015, 03:51 PM   #9
dragoraexpirafuego
Member
 
Registered: Apr 2015
Location: 9800 Savage Rd, Ft Meade, MD 20755
Distribution: TAILS, Dragora, BLAG, Parabola, Trisquel, Guix, gNewSense, Kali, PHLAK, BackBox, BlackArch, Slackwar
Posts: 34

Rep: Reputation: 0
I think we need an open source manufacturing project with lots of independent auditing to make a really secure processor + logic board.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Powerful, highly stealthy Linux trojan may have infected victims for years LXer Syndicated Linux News 0 12-09-2014 11:31 AM
NSA knew about Heartbleed for two years? xyzone General 17 04-27-2014 02:59 PM
LXer: US court disallows NSA from holding phone records beyond five years LXer Syndicated Linux News 0 03-10-2014 08:02 PM
NSA Backdoors: Dangers of bad firmware displace Linux - Security 21 02-12-2014 10:33 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 09:01 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration