• zante@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    19
    ·
    1 month ago

    No mention of transmission methods as far as I understand the article

    • Buffalox@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      ·
      1 month ago

      The whole thing sounds fishy. Like it’s trying to convince people Linux is inherently vulnerable.

      exploiting more than 20,000 common misconfigurations

      Like WTF?

    • JohnnyCanuck@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 month ago

      They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.

  • li10@feddit.uk
    link
    fedilink
    English
    arrow-up
    11
    ·
    1 month ago

    Sounds like it should at least be noticeable if you monitor resource usage?

      • li10@feddit.uk
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 month ago

        Sure, but it’s still fairly detectable when it’s on a server at least, as long as you have monitoring. Just a bitch to pinpoint and fix.

  • Buffalox@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    1 month ago

    This story reeks of FUD.

    exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets,

    Because a “common misconfiguration” will absolutely make your system vulnerable!?!
    OK show just ONE!

    This is FUD to either prevent people from using Linux, or simply a hoax to get attention, or maybe to make you think you need additional security software.

  • CyberSeeker@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    Shouldn’t be this hard to find out the attack vector.

    Buried deep, deep in their writeup:

    RocketMQ servers

    • CVE-2021-4043 (Polkit)
    • CVE-2023-33246

    I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.

    Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.

    • nyan@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 month ago

      There’s also a buried reference to using a several-years-patched gpac bug to gain root access before this thing can do most of its stealth stuff.

      Basically, it needs your system to already have a known, unpatched RCE bug before it can get a foothold, and if you’ve got one of those you have problems that go way beyond stealth crypto miners stealing electricity.