Linux malware

From Wikipedia, the free encyclopedia

The Linux operating system, Unix and other Unix-like computer operating systems are generally regarded as well-protected against computer viruses.[1] There have been successful attacks, however, on both Linux and Unix systems, the most notable perhaps being the Cuckoo's Egg attacks on Unix systems in the 1980s.

The number of viruses specifically written for Linux has been on the increase in recent years and more than doubled during 2005 from 422 to 863.[2]

Contents

[edit] Linux vulnerability

Like other Unix systems, Linux implements a multi-user environment where users are granted specific privileges and there is some form of access control implemented. As such, viruses typically have a diminished ability to change or impact the host system.

One of the vulnerabilities of Linux is that many users do not think it is vulnerable to viruses. Tom Ferris a researcher with Mission Viejo, California-based Security Protocols said in 2006, "In people's minds, if it's non-Windows, it's secure, and that's not the case. They think nobody writes malware for Linux or [Mac] OS X. But that's not necessarily true...."[2]

Shane Coursen a senior technical consultant with Kaspersky Lab noted, "The growth in Linux malware is simply due to its increasing popularity, particularly as a desktop operating system...The use of an operating system is directly correlated to the interest by the malware writers to develop malware for that OS."[2]

The viruses listed below still pose a potential, although minimal, threat to Linux systems. If an infected binary containing one of the viruses were run, the system would be infected. The infection level would depend on which user with what privileges ran the binary. A binary run under the root account would be able to infect the entire system. Privilege escalation vulnerabilities may permit malware running under a limited account to infect the entire system.

The use of software repositories significantly reduces any threat of installation of malware, as the software repositories are checked by maintainers, who ensure that their repository is malware-free. Subsequently to ensure safe distribution of the software, md5 checksums are made available. These methods of attack can be defended against using repositories protected by digital signatures which prevent the hijacking of communications using a man-in-the-middle attack or via a redirection attack such as arp or DNS poisoning. This limits the scope of attacks to include those that have administrative access to the repository itself.

[edit] Cross-platform viruses

A new area of concern identified in 2007 is that of cross-platform viruses, driven by the popularity of cross-platform applications. This was brought to the forefront of malware awareness by the distribution of an Openoffice.org virus called Bad Bunny.

Stuart Smith of Symantec wrote:

"What makes this virus worth mentioning is that it illustrates how easily scripting platforms, extensibility, plug-ins, ActiveX, etc, can be abused. All too often, this is forgotten in the pursuit to match features with another vendor... [T]he ability for malware to survive in a cross-platform, cross-application environment has particular relevance as more and more malware is pushed out via Web sites. How long until someone uses something like this to drop a JavaScript infector on a Web server, regardless of platform?"[3]

[edit] Anti-virus applications

Virus scanners such as the open source Clam AV and the commercial freeware Avast! and AVG are available for Linux.

SecurityFocus's Scott Granneman said:

...some Linux machines definitely need anti-virus software. Samba or NFS servers, for instance, may store documents in undocumented, vulnerable Microsoft formats, such as Word and Excel, that contain and propagate viruses. Linux mail servers should run AV software in order to neutralize viruses before they show up in the mailboxes of Outlook and Outlook Express users."[1]

[edit] Threats

The following is a partial list of known Linux malware:

[edit] Trojans

  • Kaiten - Linux.Backdoor.Kaiten trojan horse[4]
  • Rexob - Linux.Backdoor.Rexob trojan[5]

[edit] Viruses

  • Alaeda - Virus.Linux.Alaeda[6]
  • Bad Bunny - Perl.Badbunny[3][7]
  • Binom - Linux/Binom[8]
  • Bliss
  • Brundle[9]
  • Bukowski[10]
  • Diesel - Virus.Linux.Diesel.962[11]
  • Kagob a - Virus.Linux.Kagob.a[12]
  • Kagob b - Virus.Linux.Kagob.b[13]
  • MetaPHOR (also known as Simile)[14]
  • Nuxbee - Virus.Linux.Nuxbee.1403[15]
  • OSF.8759
  • Podloso - Linux.Podloso (The iPod virus)[16][17]
  • Rike - Virus.Linux.Rike.1627[18]
  • RST - Virus.Linux.RST.a[19]
  • Satyr - Virus.Linux.Satyr.a[20]
  • Staog
  • Vit - Virus.Linux.Vit.4096[21]
  • Winter - Virus.Linux.Winter.341[22]
  • Winux (also known as Lindose and PEElf[23]
  • ZipWorm - Virus.Linux.ZipWorm[24]

[edit] Worms

[edit] References

  1. ^ a b Granneman, Scott (October 2003). Linux vs. Windows Viruses. Retrieved on 2008-03-06.
  2. ^ a b c Patrizio, Andy (April 2006). Linux Malware On The Rise. Retrieved on 2008-03-08.
  3. ^ a b Smith, Stuart (June 2007). Bad Bunny. Retrieved on 2008-02-20.
  4. ^ Florio, Elia (February 2006). Linux.Backdoor.Kaiten. Retrieved on 2008-03-08.
  5. ^ Florio, Elia (December 2007). Linux.Backdoor.Rexob. Retrieved on 2008-03-08.
  6. ^ Kaspersky Lab (May 2007). Virus.Linux.Alaeda. Retrieved on 2008-03-08.
  7. ^ Smith, Stuart (May 2007). Perl.Badbunny. Retrieved on 2008-03-08.
  8. ^ McAfee (December 2004). Linux/Binom. Retrieved on 2008-03-08.
  9. ^ Rieck, Konrad and Konrad Kretschmer (August 2001). Brundle Fly 0.0.1 - A Good-Natured Linux ELF Virus. Retrieved on 2008-03-08.
  10. ^ de Almeida Lopes, Anthony (July 2007). Project Bukowski. Retrieved on 2008-03-08.
  11. ^ Kaspersky Lab (February 2002). Virus.Linux.Diesel.962. Retrieved on 2008-03-08.
  12. ^ Kaspersky Lab (April 2001). Virus.Linux.Kagob.a. Retrieved on 2008-03-08.
  13. ^ Kaspersky Lab (undated). Virus.Linux.Kagob.b. Retrieved on 2008-03-08.
  14. ^ The Mental Driller (February 2002). Metamorphism in practice or "How I made MetaPHOR and what I've learnt". Retrieved on 2008-03-08.
  15. ^ Kaspersky Lab (December 2001). Virus.Linux.Nuxbee.1403. Retrieved on 2008-03-08.
  16. ^ Ferrie, Peter (April 2007). Linux.Podloso. Retrieved on 2008-03-08.
  17. ^ Ferrie, Peter (April 2007). The iPod virus. Retrieved on 2008-03-08.
  18. ^ Kaspersky Lab (August 2003). Virus.Linux.Rike.1627. Retrieved on 2008-03-08.
  19. ^ Kaspersky Lab (January 2002). Virus.Linux.RST.a. Retrieved on 2008-03-08.
  20. ^ Kaspersky Lab (March 2001). Virus.Linux.Satyr.a. Retrieved on 2008-03-08.
  21. ^ Kaspersky Lab (March 2000). Virus.Linux.Vit.4096. Retrieved on 2008-03-08.
  22. ^ Kaspersky Lab (October 2000). Virus.Linux.Winter.341. Retrieved on 2008-03-08.
  23. ^ Rautiainen, Sami et al (March 2001). F-Secure Virus Descriptions : Lindose. Retrieved on 2008-03-08.
  24. ^ Kaspersky Lab (January 2001). Virus.Linux.ZipWorm. Retrieved on 2008-03-08.
  25. ^ Kaspersky Lab (May 2001). Net-Worm.Linux.Adm. Retrieved on 2008-03-08.
  26. ^ Rautiainen, Sami (April 2001). F-Secure Virus Descriptions : Adore. Retrieved on 2008-03-08.
  27. ^ Kaspersky Lab (May 2001). Net-Worm.Linux.Cheese. Retrieved on 2008-03-08.
  28. ^ Rautiainen, Sami (April 2001). F-Secure Virus Descriptions : Kork. Retrieved on 2008-03-08.
  29. ^ Kaspersky Lab (October 2002). Net-Worm.Linux.Mighty. Retrieved on 2008-03-08.
  30. ^ Perriot, Frederic (February 2007). Linux.Millen.Worm. Retrieved on 2008-03-08.
  31. ^ Rautiainen, Sami et al (September 2002). F-Secure Virus Descriptions : Slapper. Retrieved on 2008-03-08.
  32. ^ Voss, Joel (December 2007). SSH Bruteforce Virus by AltSci Concepts. Retrieved on 2008-03-13.

[edit] External links