Should a home user worry about this? (malware)

Chat about Linux in general
Forum rules
Do not post support questions here. Before you post read the forum rules. Topics in this forum are automatically closed 6 months after creation.
User avatar
MikeNovember
Level 7
Level 7
Posts: 1856
Joined: Fri Feb 28, 2020 7:37 am
Location: Nice, Paris, France

Re: Should a home user worry about this? (malware)

Post by MikeNovember »

Marie SWE wrote: Mon May 16, 2022 1:04 pm [...]
I do follow MikeNovember post but with a few additions. one, as I do what to be able to detect suspicious activity's on all of my computers, not only in the network traffic. two and I also have outbound firewall rules on every computer as spyware sends data out in the background and its often by it's own processes/programs. also remote access is often create through a tunnel from the inside and out, to bypass firewalls as they often is default set to allow all outbound traffic.
[...]
Hi,

Unfortunately, outbound rules are essentially useless:
- you have seen in the quoted analysis that, once installed, the malware BPFdoor is able to make "low level" outbound connections, bypassing firewalls.
- moreover, malware programs, for long, have used a trick: they "attach" themselves in memory to legit applications, such as browsers, to make authorized outbound connections.

Regards,

MN
_____________________________
Linux Mint 21.3 Mate host with Ubuntu Pro enabled, VMware Workstation Player with Windows 10 Pro guest, ASUS G74SX (i7-2670QM, 16 GB RAM, GTX560M with 3GB RAM, 1TB SSD).
User avatar
Moem
Level 22
Level 22
Posts: 16229
Joined: Tue Nov 17, 2015 9:14 am
Location: The Netherlands
Contact:

Re: Should a home user worry about this? (malware)

Post by Moem »

rene wrote: Mon May 16, 2022 6:42 pm Thing is that local attack is by and large always required; untrusted local user or malware.
Quoting this just to make it easier to spot, for those of us whose eyes glaze over when reading longer postings.
Image

If your issue is solved, kindly indicate that by editing the first post in the topic, and adding [SOLVED] to the title. Thanks!
t42
Level 11
Level 11
Posts: 3733
Joined: Mon Jan 20, 2014 6:48 pm

Re: Should a home user worry about this? (malware)

Post by t42 »

After reading all this
...
And that worries me
So FUD influencers were successful?

There is nothing to worry about as it's not your job to detect industrial strength malware...
-=t42=-
t42
Level 11
Level 11
Posts: 3733
Joined: Mon Jan 20, 2014 6:48 pm

Re: Should a home user worry about this? (malware)

Post by t42 »

MikeNovember wrote: Mon May 16, 2022 9:04 am
Detection:
- A rootkit checker such as rkhunter checks for rootkits presence (with low detection rate, since it is outdated), but also makes hashes of your system files, during the 1st use; during following uses, it will compare the hash with the 1st one, stored, and will detect if file has changed; user will have to decide if change is normal (in case of file update; Synaptic will help with its history) or not. Of course, the 1st use of rkhunter should be done on a freshly installed secure system.

- The use of an antivirus, such as Clamav, might help to detect installed malware when doing a complete system scan; however:
* Clamav detection rate is low, it should be completed by Clamav unofficial signatures,
* using an antivirus program from an infected computer might arrive to non-detection (virus/malware could use "countermeasures"), and Clamav should so be installed and used from an external boot disk,
Usefulness of recommended rootkit checker and Clamav in the context of this post on the scale from 1 to 10 is:

Code: Select all

[1]
-=t42=-
rene
Level 20
Level 20
Posts: 12212
Joined: Sun Mar 27, 2016 6:58 pm

Re: Should a home user worry about this? (malware)

Post by rene »

t42 wrote: Tue May 17, 2022 1:26 pm So FUD influencers were successful?
They always are because, yes, again, "better safe than sorry", right.

Well, as to someone at least. I will admit that Schultz' recent poll viewtopic.php?f=61&t=372761 sitting at ninety-five percent was sort of heart-warming; I guess the five percent will just have to fend for themselves: generally (democratic) societies have about fifteen percent unsalvageables so I'm calling it a success.
iliketrains
Level 4
Level 4
Posts: 241
Joined: Wed Aug 26, 2020 6:32 pm

Re: Should a home user worry about this? (malware)

Post by iliketrains »

Malware method #4 manipulated iso ?
Mint nipped that in the bud but what floats around in torrents etc ?
Stay vigilant, just because you're paranoid doesn't mean they're not after you. But don't over do the paranoia, it's not healthy.
Last edited by iliketrains on Tue May 17, 2022 2:30 pm, edited 1 time in total.
User avatar
Termy
Level 12
Level 12
Posts: 4248
Joined: Mon Sep 04, 2017 8:49 pm
Location: UK
Contact:

Re: Should a home user worry about this? (malware)

Post by Termy »

Marie SWE wrote: Sun May 15, 2022 9:25 pm Linux isn't immune
It never was; please don't listen to anyone who tells you otherwise. We are extraordinarily well protected, but we're certainly not immune.
I'm also Terminalforlife on GitHub.
User avatar
RollyShed
Level 8
Level 8
Posts: 2436
Joined: Sat Jan 12, 2019 8:58 pm
Location: South Island, New Zealand
Contact:

Re: Should a home user worry about this? (malware)

Post by RollyShed »

PCDoctor wrote: Tue May 17, 2022 3:46 pmIf nobodies software is checking my system, then it kinda is my job
I dont want that job and im not qualified
OK, go back to Windows, no one stopping you, and get wiped out by Microsoft doing something stupid. It happens time after time and no virus checker will stop it.
User avatar
MikeNovember
Level 7
Level 7
Posts: 1856
Joined: Fri Feb 28, 2020 7:37 am
Location: Nice, Paris, France

Re: Should a home user worry about this? (malware)

Post by MikeNovember »

t42 wrote: Tue May 17, 2022 1:40 pm Usefulness of recommended rootkit checker and Clamav in the context of this post on the scale from 1 to 10 is:

Code: Select all

[1]
Sorry, but you are wrong:

- Among the names used by BPFDoor, there is "avahi-daemon", a legit file present on Ubuntu / Linux Mint. The use of cryptographic hashes, such as done by rkhunter or by tripwire, would identify that "avahi-daemon" has changed. [I did not recommend any rootkit checker but rkhunter, writing "A rootkit checker such as rkhunter checks for rootkits presence (with low detection rate, since it is outdated), but also makes hashes of your system files, during the 1st use; during following uses, it will compare the hash with the 1st one, stored, and will detect if file has changed"]

- As per the quoted web page, there are now 21 among the several tens of viruses scanners used by Virus-Total that can detect BPF Door; so the use of a virus scanner is now appropriate (after four years!) to detect this malware.

So, would you have taken time to read and have your brain function, you would not have written this answer.

Regards,

MN
_____________________________
Linux Mint 21.3 Mate host with Ubuntu Pro enabled, VMware Workstation Player with Windows 10 Pro guest, ASUS G74SX (i7-2670QM, 16 GB RAM, GTX560M with 3GB RAM, 1TB SSD).
t42
Level 11
Level 11
Posts: 3733
Joined: Mon Jan 20, 2014 6:48 pm

Re: Should a home user worry about this? (malware)

Post by t42 »

Sorry, but you are wrong:

- Among the names used by BPFDoor, there is "avahi-daemon", a legit file present on Ubuntu / Linux Mint. The use of cryptographic hashes, such as done by rkhunter or by tripwire, would identify that "avahi-daemon" has changed. [I did not recommend any rootkit checker but rkhunter, writing "A rootkit checker such as rkhunter checks for rootkits presence (with low detection rate, since it is outdated), but also makes hashes of your system files, during the 1st use; during following uses, it will compare the hash with the 1st one, stored, and will detect if file has changed"]

- As per the quoted web page, there are now 21 among the several tens of viruses scanners used by Virus-Total that can detect BPF Door; so the use of a virus scanner is now appropriate (after four years!) to detect this malware.

So, would you have taken time to read and have your brain function, you would not have written such a nonsense and condescending answer.
For the benefit of someone who happens to read the above false information:
The implant overwrites the argv[0] to full /proc and determine the command line and command name. So the investigator running ps will see the bogus name. No legit files are overwritten, also rkhunter is not running realtime, but usually on the cron.daily bases. BPFDoor runs leaving no obvious traces.
-=t42=-
User avatar
MurphCID
Level 15
Level 15
Posts: 5908
Joined: Fri Sep 25, 2015 10:29 pm
Location: Near San Antonio, Texas

Re: Should a home user worry about this? (malware)

Post by MurphCID »

t42 wrote: Wed May 18, 2022 6:56 am
Sorry, but you are wrong:

- Among the names used by BPFDoor, there is "avahi-daemon", a legit file present on Ubuntu / Linux Mint. The use of cryptographic hashes, such as done by rkhunter or by tripwire, would identify that "avahi-daemon" has changed. [I did not recommend any rootkit checker but rkhunter, writing "A rootkit checker such as rkhunter checks for rootkits presence (with low detection rate, since it is outdated), but also makes hashes of your system files, during the 1st use; during following uses, it will compare the hash with the 1st one, stored, and will detect if file has changed"]

- As per the quoted web page, there are now 21 among the several tens of viruses scanners used by Virus-Total that can detect BPF Door; so the use of a virus scanner is now appropriate (after four years!) to detect this malware.

So, would you have taken time to read and have your brain function, you would not have written such a nonsense and condescending answer.
For the benefit of someone who happens to read the above false information:
The implant overwrites the argv[0] to full /proc and determine the command line and command name. So the investigator running ps will see the bogus name. No legit files are overwritten, also rkhunter is not running realtime, but usually on the cron.daily bases. BPFDoor runs leaving no obvious traces.
Ok for normies, how easy it to get this, and should we as "normal users" be worried? So for me going to a coffeeshop, surfing the net, and not clicking on any phishing emails, how likely am I to get this malware? Again, is it the Black Death of malware, infecting millions of systems and wreaking havoc, or is it just a minor outbreak of the flu?
User avatar
Moem
Level 22
Level 22
Posts: 16229
Joined: Tue Nov 17, 2015 9:14 am
Location: The Netherlands
Contact:

Re: Should a home user worry about this? (malware)

Post by Moem »

MurphCID wrote: Wed May 18, 2022 7:23 am Ok for normies, how easy it to get this, and should we as "normal users" be worried? So for me going to a coffeeshop, surfing the net, and not clicking on any phishing emails, how likely am I to get this malware?
I believe Rene has answered that question several times in this very topic. This was the first time:
viewtopic.php?p=2176467#p2176467
Surely it's easier to read it again, as often as needed, instead of asking people to repeat themselves or others?
Image

If your issue is solved, kindly indicate that by editing the first post in the topic, and adding [SOLVED] to the title. Thanks!
User avatar
MikeNovember
Level 7
Level 7
Posts: 1856
Joined: Fri Feb 28, 2020 7:37 am
Location: Nice, Paris, France

Re: Should a home user worry about this? (malware)

Post by MikeNovember »

t42 wrote: Wed May 18, 2022 6:56 am For the benefit of someone who happens to read the above false information:
The implant overwrites the argv[0] to full /proc and determine the command line and command name. So the investigator running ps will see the bogus name. No legit files are overwritten, also rkhunter is not running realtime, but usually on the cron.daily bases. BPFDoor runs leaving no obvious traces.
Once more wrong, once more you don't know how rkhunter works and what BPFDoor does.
From https://www.bleepingcomputer.com/news/s ... te-access/:
Part of BPFdoor's techniques to evade detection is to rename the binary to appear as a normal Linux daemon using the choices below:

/sbin/udevd -d
/sbin/mingetty /dev/tty7
/usr/sbin/console-kit-daemon --no-daemon
hald-addon-acpi: listening on acpi kernel interface /proc/acpi/event
dbus-daemon --system
hald-runner
pickup -l -t fifo -u
avahi-daemon: chroot helper
/sbin/auditd -n
/usr/lib/systemd/systemd-journald

Pourcelot says that the threat actor updated BPFdoor regularly, improving each release with different names for commands, processes, or files.
Among the names mentioned, "avahi-daemon" is the name of an existing legit file.

Once rkhunter is installed, you run a:

Code: Select all

sudo rkhunter --propupd
Rkhunter will create the system files properties database with files hashes.
If, after this creation, a file is altered (update, or overwritten by malware), a rkhunter check will mention this change, and user will be warned something has changed.
BPFDoor install, or any malware install that overwrites a system file, will be detected.
Of course, rkhunter is not a real-time scanner, and needs to be launched manually or using cron.

For a better detection (largest number of system files changes survey and system files additions), see the following tutorial about Tripwire: viewtopic.php?f=42&t=374056

Regards,

MN
_____________________________
Linux Mint 21.3 Mate host with Ubuntu Pro enabled, VMware Workstation Player with Windows 10 Pro guest, ASUS G74SX (i7-2670QM, 16 GB RAM, GTX560M with 3GB RAM, 1TB SSD).
t42
Level 11
Level 11
Posts: 3733
Joined: Mon Jan 20, 2014 6:48 pm

Re: Should a home user worry about this? (malware)

Post by t42 »

MikeNovember wrote: Wed May 18, 2022 8:26 am Among the names mentioned, "avahi-daemon" is the name of an existing legit file.
.....
Of course, rkhunter is not a real-time scanner, and needs to be launched manually or using cron.
Even after it was hinted that the implant overwrites the argv[0] to full /proc and determine the command line and command name, still, understanding nothing. It seems that words "avahi-daemon" affects someone as a bull red flag.

And what all this has to do with how rkhunter works - rkhunter is not running realtime though such tool makes no difference in case of BPFdoor detection even it was.
-=t42=-
User avatar
Termy
Level 12
Level 12
Posts: 4248
Joined: Mon Sep 04, 2017 8:49 pm
Location: UK
Contact:

Re: Should a home user worry about this? (malware)

Post by Termy »

Regarding rkhunter(8): it uses a database ('/var/lib/rkhunter/db') to store information on the nasties, so while the program itself will be out of date, the database will not, allowing it to still detect newer rootkits, hence the --update flag.
I'm also Terminalforlife on GitHub.
User avatar
MurphCID
Level 15
Level 15
Posts: 5908
Joined: Fri Sep 25, 2015 10:29 pm
Location: Near San Antonio, Texas

Re: Should a home user worry about this? (malware)

Post by MurphCID »

Moem wrote: Wed May 18, 2022 7:31 am
MurphCID wrote: Wed May 18, 2022 7:23 am Ok for normies, how easy it to get this, and should we as "normal users" be worried? So for me going to a coffeeshop, surfing the net, and not clicking on any phishing emails, how likely am I to get this malware?
I believe Rene has answered that question several times in this very topic. This was the first time:
viewtopic.php?p=2176467#p2176467
Surely it's easier to read it again, as often as needed, instead of asking people to repeat themselves or others?
Perhaps I am dense but I did read his post, and I am still somewhat confused. Sorry. Never mind DUH! I was having a senior moment! I re-read his second post and it is all there. Sorry about that there is so much going on in my life right now I am a bit scatterbrained.
User avatar
Moem
Level 22
Level 22
Posts: 16229
Joined: Tue Nov 17, 2015 9:14 am
Location: The Netherlands
Contact:

Re: Should a home user worry about this? (malware)

Post by Moem »

MurphCID wrote: Wed May 18, 2022 5:33 pm Perhaps I am dense but I did read his post, and I am still somewhat confused. Sorry.
Well, let me summarize it (emphasis is mine):
rene wrote: Sun May 15, 2022 4:55 pm No, not worrisome for desktop Linux users. (...)
Getting infected with this or any other malware in the first place is what you on desktop Linux have to go far out of your way for (...)
It's getting it on your system that's on desktop Linux and in practice a very close to zero chance, what with e.g. the repository model; users very much not being in the habit of downloading and running random executables from the web.
If it's still not clear whether or not Rene considers it something you should worry about, then I guess I can't make it clear.
Image

If your issue is solved, kindly indicate that by editing the first post in the topic, and adding [SOLVED] to the title. Thanks!
rene
Level 20
Level 20
Posts: 12212
Joined: Sun Mar 27, 2016 6:58 pm

Re: Should a home user worry about this? (malware)

Post by rene »

Thanks much. I'm getting terribly burned out from these threads...
rickNS
Level 9
Level 9
Posts: 2968
Joined: Tue Jan 25, 2011 11:59 pm

Re: Should a home user worry about this? (malware)

Post by rickNS »

rene wrote: Wed May 18, 2022 5:44 pm Thanks much. I'm getting terribly burned out from these threads...
And, those who propagate them, but even worse, are those defending / trying to justify them.
Mint 20.0, and 21.0 MATE on Thinkpads, 3 X T420, T450, T470, and X200
User avatar
Termy
Level 12
Level 12
Posts: 4248
Joined: Mon Sep 04, 2017 8:49 pm
Location: UK
Contact:

Re: Should a home user worry about this? (malware)

Post by Termy »

TBF, I don't blame ex-Windows users struggling with this stuff. It's the norm in Windows, which they seem sort of brainwashed to accept. I know it gets frustrating to answer the same stuff over and over, but if you're getting burned out or something, take a break! ;) I get drained too, but that's when I tend to leave it alone for a while.
I'm also Terminalforlife on GitHub.
Locked

Return to “Chat about Linux”