TranslateProject/sources/talk/20141222 A brief history of Linux malware.md
2014-12-22 16:36:34 +08:00

5.9 KiB
Raw Blame History

A brief history of Linux malware

A look at some of the worms and viruses and Trojans that have plagued Linux throughout the years.

Nobodys immune

Image courtesy Shutterstock

Although not as common as malware targeting Windows or even OS X, security threats to Linux have become both more numerous and more severe in recent years. There are a couple of reasons for that the mobile explosion has meant that Android (which is Linux-based) is among the most attractive targets for malicious hackers, and the use of Linux as a server OS for and in the data center has also grown but Linux malware has been around in some form since well before the turn of the century. Have a look.

Staog (1996)

The first recognized piece of Linux malware was Staog, a rudimentary virus that tried to attach itself to running executables and gain root access. It didnt spread very well, and it was quickly patched out in any case, but the concept of the Linux virus had been proved.

Bliss (1997)

If Staog was the first, however, Bliss was the first to grab the headlines though it was a similarly mild-mannered infection, trying to grab permissions via compromised executables, and it could be deactivated with a simple shell switch. It even kept a neat little log, according to online documentation from Ubuntu.

Ramen/Cheese (2001)

Cheese is the malware you actually want to get certain Linux worms, like Cheese, may actually have been beneficial, patching the vulnerabilities the earlier Ramen worm used to infect computers in the first place. (Ramen was so named because it replaced web server homepages with a goofy image saying that “hackers looooove noodles.”

Slapper (2002)

Image courtesy Wikimedia CommonsCC LicenseKevin Collins

The Slapper worm struck in 2002, infecting servers via an SSL bug in Apache. That predates Heartbleed by 12 years, if youre keeping score at home.

Badbunny (2007)

Image courtesy Shutterstock

Badbunny was an OpenOffice macro worm that carries a sophisticated script payload that worked on multiple platforms even though the only effect of a successful infection was to download a raunchy pic of a guy in a bunny suit, er, doing what bunnies are known to do.

Snakso (2012)

Image courtesy TechWorld UK

The Snakso rootkit targeted specific versions of the Linux kernel to directly mess with TCP packets, injecting iFrames into traffic generated by the infected machine and pushing drive-by downloads.

Hand of Thief (2013)

Hand of Thief is a commercial (sold on Russian hacker forums) Linux Trojan creator that made quite a splash when it was introduced last year. RSA researchers, however, discovered soon after that it wasnt quite as dangerous as initially thought.

Windigo (2014)

Image courtesy freezelight

Windigo is a complex, large-scale cybercrime operation that targeted tens of thousands of Linux servers, causing them to produce spam and serve drive-by malware and redirect links. Its still out there, according to ESET security, so admins should tread carefully.

Shellshock/Mayhem (2014)

Shellshock/Mayhem (2014)

Striking at the terminal strikes at the heart of Linux, which is why the recent Mayhem attacks which targeted the so-called Shellshock vulnerabilities in Linuxs Bash command-line interpreter using a specially crafted ELF library were so noteworthy. Researchers at Yandex said that the network had snared 1,400 victims as of July.

Turla (2014)

Image courtesy CW

A large-scale campaign of cyberespionage emanating from Russia, called Epic Turla by researchers, was found to have a new Linux-focused component earlier this week. Its apparently based on a backdoor access program from all the way back in 2000 called cd00r.


via: http://www.networkworld.com/article/2858742/linux/a-brief-history-of-linux-malware.html

作者:Jon Gold 译者:译者ID 校对:校对者ID

本文由 LCTT 原创翻译,Linux中国 荣誉推出