Brilliant Trojan Idea that we aren't immune to

James Wilkinson ubuntu at westexe.demon.co.uk
Tue May 31 16:59:53 UTC 2005


Andy Choens wrote:
> But, here's this new toy I read about.  This thing I saw on the BBC
> currently attacks windows, but could be pretty easily reconfigured to
> attack us just as easily.  IE downloads and runs it (loud round of
> applause for IE please).  It installed encryption software on your
> computer and then encrypts all of your data....you know the stuff in
> your My Documents Folder!  It leaves you with nothing but a big
> encrypted mess, and a text file explaining how to get your !@#$% back.
>  It's a freakin' ransom note!  This is absolutely brilliant.  Here's
> why I think we shouldn't laugh too much.  True, it can't install
> encryption software on a Linux computer because it wouldn't have the
> right privileges for it, but think how many of us already have that
> software installed on our computers!  I certainly do.....many of you
> do as well.  Heck....the more paranoid you are, the more likely you
> are to have it installed!
> 
> Next step, if someone can find a buffer over-run in a graphics library
> somewhere or some other cute buffer over-run and then slip a carefully
> made graphic, or whatever into the website, to run a simple script,
> we'd get hit just as hard.

Yes, once someone can find a vulnerable buffer over-run somewhere they
can get at it, they can get into your system. That's the real hole. That
there might be software on the system to help them further isn't that
big a deal. Encryption software isn't a lot to download.

That's how the few existing Linux worms spread; through unpatched holes
on old (even then) versions of Red Hat Linux, without firewalls. (Google
for Ramen and "L10n worm").

And that's what the Linux community have been fighting:

 * stuff like apt-get upgrade, yum, up2date to make "keeping it patched"
   easy;

 * distros coming by default with firewalls and not running stuff open
   to the net to minimize targets;
   
 * stuff like execshield, nx and SELinux to minimise what attackers can
   do with buffer over-runs (at different levels: nx and execshield stop
   them running code that way, while SELinux stops the code going too
   far);

 * continued attention to exposed software to minimise vulnerabilities

 * possibly un-intentionally, the range of software available seems to
   be growing. So there are more different versions and a lower
   percentage of vulnerable systems.

 * I get the impression that there are a growing number of AMD64 or
   Power based users (and then there's S390 mainframes)... That makes an
   attackers life difficult, too.

James.
-- 
E-mail address: james | We still have enough spare cardboard sitting around
@westexe.demon.co.uk  | to send a bus by Parcelforce, although not enough
                      | wrapping to be sure they wouldn't deliver it broken
                      | into two pieces.  -- Alan Cox




More information about the ubuntu-users mailing list