Eblogtip.com
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions

Archives

  • June 2023
  • May 2023
  • December 2022

Categories

  • News
  • Technology
  • Uncategorized
eBlogTip
  • Categories
    • News
    • Technology
    • Domains
    • Hosting
    • Promotions
  • News

Open-source Linux utility is being hijacked to hack devices

  • December 6, 2022
Total
0
Shares
0
0
0


A new report has highlighted how some hackers are not interested in having malware or viruses installed on the target endpoints, but instead work at bringing their entire toolbox to the victim’s device, which would then help them pick and choose the best malicious tool for each individual target. 

Research from Sysdig, which calls the method “Bring Your Own Filesystem”, or BYOF for short, has found that so far, the method works on Linux devices, thanks to a vulnerable utility called PRoot.

According to Sysdig, the threat actors would create an entire malicious filesystem on their own devices, and then have it downloaded and mounted on the compromised endpoint. That way, they get a preconfigured toolkit helping them compromise Linux systems even more.

Installing cryptojackers

“First, threat actors build a malicious filesystem which will be deployed. This malicious filesystem includes everything that the operation needs to succeed,” Sysdig said in its report. “Doing this preparation at this early stage allows all of the tools to be downloaded, configured, or installed on the attacker’s own system far from the prying eyes of detection tools.”

Although so far the software company only observed the method being used to install cryptocurrency miners on these devices, it says the potential for more disruptive and damaging attacks is there. 

PRoot is a utility tool that allows users to create isolated root filesystems on Linux. While the tool is designed to have all the processes running within the guest filesystem, there are ways to mix host and guest programs, which is what the threat actors are abusing. Furthermore, programs running in the guest filesystem can use the built-in mount/bind mechanism to access files and directories from the host system.

Apparently, abusing PRoot to deliver malware is relatively easy, as the tool is statically compiled and doesn’t require additional dependencies. All hackers need to do is download the precombined binary from GitLab and mount it on the target endpoint. 

“Any dependencies or configurations are also included in the filesystem, so the attacker does not need to run any additional setup commands,” Sysdig says. “The attacker launches PRoot, points it at the unpacked malicious filesystem, and specifies the XMRig binary to execute.”

Via: BleepingComputer (opens in new tab)


Source link

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Previous Article
  • Technology

Snapchat is testing Lenses with power-ups and upgrades that you can buy • TechCrunch

  • December 6, 2022
View Post
Next Article
  • Technology

Meta’s behavioral ads will finally face GDPR privacy reckoning in January • TechCrunch

  • December 6, 2022
View Post
You May Also Like
View Post
  • News

WWDC 2023: the 3 big reveals we need from Apple

  • June 4, 2023
View Post
  • News

GTA 5 took 10 years to introduce this feature and we’re so pleased it’s finally here

  • June 4, 2023
View Post
  • News

This new Steam update will show you the lowest price a game has sold for in the last 30 days

  • June 4, 2023
View Post
  • News

This Google Workspace security flaw could let hackers quietly steal your Drive files

  • June 4, 2023
View Post
  • News

Apple rumored to be announcing major Siri updates at WWDC 2023

  • June 4, 2023
View Post
  • News

These Activists Distrust Voting Machines. Just Don’t Call Them Election Deniers.

  • June 4, 2023
View Post
  • News

Quordle today – hints and answers for Sunday, June 4 (game #496)

  • June 4, 2023
View Post
  • News

Diablo 4’s authentication servers are down, preventing players from logging in

  • June 3, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eBlogTip.com
  • Categories

Input your search keywords and press Enter.