[Bug 1508248] Re: chkrootkit gives false positive ebury
sleek
sillypeople139 at gmail.com
Fri Oct 23 00:34:33 UTC 2015
there is not much have to do to produce this error other than install the program and type : sudo chkrootkit
according to relevent websites i found this error occurs because ssh didn't use implement -g so chkrootkits method of this rootkit is no longer valid. par the following conversation on the ubuntu forums:
Thread Tools
Display
August 24th, 2015 #1
fthx
fthx is offline Spilled the Beans
Join Date
Jul 2015
Beans
14
Heartbreaking chkrootkit 'operation windigo' positive warning
Hi,
Was raining today but suddenly I got the sun in my face :
Code:
sudo chkrootkit
Searching for Linux/Ebury - Operation Windigo ssh...
Possible Linux/Ebury - Operation Windigo installetd
(original typo...)
Well... after some search I think it's a false positive. (I do not play with fishy PPAs and do not use my system as a server.)
Sources :
http://www.eset.com/int/about/press/...net-uncovered/
https://www.cert-bund.de/ebury-faq
http://ubuntuforums.org/showthread.p...ration+windigo
https://bbs.archlinux.org/viewtopic.php?id=195395
https://github.com/openssh/openssh-p...75ab3b9cc84cba
If you run the "ssh -G" test in above links, you could be scared. But the commit (link to github) seems to show that a new ssh option has been introduced since the testing command line :
Code:
ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo
"System clean" || echo "System infected"
So this command does not return any error message, so you should
get "System infected" in your terminal...
I checked the sizes of the libraries (2nd link), ran ipcs
commands and everything seemed to be ok.
What do you think about this stuff ? Should I run some
additional tests ?
Advanced reply Adv Reply Reply With Quote Reply With Quote
August 24th, 2015 #2
runrickus's Avatar
runrickus
runrickus is offline Iced Almond Soy Ubuntu, No Foam
Join Date
Jun 2005
Location
The Front 9
Beans
Hidden!
Distro
Ubuntu Mate Development Release
Re: Heartbreaking chkrootkit 'operation windigo' positive warning
I would think you would be safe if you did not show "System
infected"
Also there is this to show if infected.
Code:
# netstat -nap | grep "@/proc/udevd"
Ebury version 1.5
On Linux-based systems, an additional shared library file 'libns2.so' is installed and the existing libkeyutils file is patched to link against this library instead of libc6. The malicious 'libns2.so' file can be located by running the following command, which should not return any results on clean systems.
# find /lib* -type f -name libns2.so
/lib64/libns2.so Ebury now uses Unix domain sockets instead of shared memory segments for interprocess communication. The malicious socket can be located using 'netstat' as follows. Again, this command should not return any results on clean systems.
Do antivirus products or other security tools detect Ebury?Some antivirus products are capable of detecting Ebury, usually as 'SSHDoor' or 'Sshdkit'. However,ClamAV or tools like chkrootkit or rkhunter currently do not detect Ebury.
For Me
Code:
me-Aspire-M3300 me # netstat -nap | grep "@/proc/udevd"
me-Aspire-M3300 # exit
exit
me at me-Aspire-M3300:~$ ssh -G 2>&1 | grep -e illegal -e unknown > /dev/null && echo "System clean" || echo "System infected"
System clean
Hope that helps
Regards
what i expect is an explation of why my conclusion is wrong, and this is a real infection; or a fix to the software, so i get no more false positives. What i need is a malware
by the way this seems not only affect ubuntu to affect not only has been reported at Debian and and Red Hat three months ago but chkrootkit rootkit scanner seems not be fixed for ubuntu
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to chkrootkit in Ubuntu.
https://bugs.launchpad.net/bugs/1508248
Title:
chkrootkit gives false positive ebury
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chkrootkit/+bug/1508248/+subscriptions
More information about the Ubuntu-server-bugs
mailing list