• Warl0k3@lemmy.world
    link
    fedilink
    English
    arrow-up
    113
    arrow-down
    8
    ·
    edit-2
    8 months ago

    As much as I loathe m$, the one thing they got right was forcing casual users (windows home) to install security updates as top priority, whether they like it or not. I know we all hate on windows, and rightly so, but that policy does nullify this particular vector and that is great for the consumer-level users.

    (… for the sake of argument lets just pretend windows doesnt have 10,000 other vulns the malware devs can just exploit instead)

    • halcyoncmdr@lemmy.world
      link
      fedilink
      English
      arrow-up
      62
      arrow-down
      2
      ·
      8 months ago

      Also keep in mind that the main reason Windows is targeted for so many exploits is because of the consumer market share. If Linux consumer market share goes up, so will general malware targeting it. We already saw it happen when OSX share increased and Apple had to abandon the whole “Macs don’t get viruses” schtick.

      • Chozo@fedia.io
        link
        fedilink
        arrow-up
        29
        ·
        edit-2
        8 months ago

        We already saw it happen when OSX share increased and Apple had to abandon the whole “Macs don’t get viruses” schtick.

        It’s kinda crazy that Apple got away with spinning “Our products don’t sell well enough for this to be a problem” into a marketing point for as long as they did.

        • Bimbleby@lemmy.world
          link
          fedilink
          English
          arrow-up
          11
          ·
          8 months ago

          I assume they said it was due to other reasons than obscurity, although we know better.

      • Rob Bos@lemmy.ca
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        8 months ago

        Linux has had a long history of worms and viruses, fortunately (sorta) thanks to its server legacy. Dumb and lazy server admins have given it pretty good ‘secure by default’ behaviours and cultures.

        Desktop users though: whole different set of challenges.

    • Molecular0079@lemmy.world
      link
      fedilink
      English
      arrow-up
      32
      arrow-down
      3
      ·
      8 months ago

      I mean, I don’t think I would mind forced updates if they didn’t take so damned long and fail half the time. And then, just when you think you’ve finished installing all updates, you reboot and there’s more updates! Why can’t they just install it all at once?

      Plus, after each major update, Microsoft wastes your time by advertising to you about Edge, Office 365, and OneDrive before they even let you get back into the desktop.

      Forced security updates is addressing a symptom but not addressing the root cause, which is that the Windows update process is just painful for a myriad of reasons. In Linux, I run one command, wait 5 minutes, reboot, and I am back to work.

      • LadyAutumn@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        9
        ·
        8 months ago

        I love that on my arch setup, I update every single day, usually more than once, and doing so almost never requires me to powercycle my computer.

        • Molecular0079@lemmy.world
          link
          fedilink
          English
          arrow-up
          11
          ·
          8 months ago

          There is occasional weirdness if you don’t powercycle though. In particular, certain KDE updates will make the desktop misbehave until you reboot. I get where you’re coming from though. Quick updates and the ability to decide when you want to restart means that I have no qualms about updating frequently.

          I am on Arch too and pacman -Syu is usually a snack I have with my morning tea.

          • coolmojo@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            8 months ago

            You can log out, then CTRL + ALT + F1 , log in and run the update command. If there was no kernel update, you don’t have to reboot. If some service got updated restart the service (if that was not done by the updater.) Then you can switch back to the graphical session usually by CTRL + ALT + F7) and log in again.

      • jabjoe@feddit.uk
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        8 months ago

        Market share is only any kind of excuse for desktop. Linux dominates servers, routers, and any IOT big enough for a OS. This article is about servers.

        For Linux you install unattended upgrades and security updates are done automatically.

    • Justin@lemmy.jlh.name
      link
      fedilink
      English
      arrow-up
      18
      ·
      8 months ago

      Linux has good security updates too. Fedora installs pending updates on restart, and I believe flatpaks are updated automatically in the background.

      The virus discussed in the article doesn’t affect Linux PCs, only servers. Windows-style forced reboots wouldn’t make sense in a server environment, and it’s up to the server administrators to implement good update policies for their nodes and containers.

      • Warl0k3@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        8 months ago

        I am aware, it’s just a relevant and closely related observation about consumer OSes. You make good points. A professional server admin > automstic updates (most of the time…)

    • root@precious.net
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      8 months ago

      The problem with Windows Updates is that they force new ‘features’ on you along with the patches.

      With Linux you get to choose how bleeding edge you want to be, and can generally avoid the monetization crap.

    • spez_@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      2
      ·
      8 months ago

      I don’t want to install security updates. You cannot and will not force me. Case closed.

    • UnityDevice@startrek.website
      link
      fedilink
      English
      arrow-up
      24
      ·
      8 months ago

      Seems it’s exploiting vulnerabilities in some software called “Ivanti Connect Secure VPN”, so unless you’re running that, you’re safe I guess. Says in the past they used vulnerabilities in “Qlik Sense” and Adobe “Magento”. Never heard of any of those, but I guess maybe some businesses use them?

      • Macros@feddit.de
        link
        fedilink
        English
        arrow-up
        11
        ·
        8 months ago

        Ivanti Connect Secure VPN

        So its spreading via a closed source VPN software. Why should you even use that when there is great VPN software available on Linux which work reliable for decades?

        Well of course you miss zero trust connections, multi-cloud readiness, award‑winning security and proven secure corporate access …

        • Faresh@lemmy.ml
          link
          fedilink
          English
          arrow-up
          5
          ·
          8 months ago

          These vpns seem to be quite a good target since at least the one my university uses is run as a setuid executable, so if there is a vulnerability in there, you can execute code as root that wasn’t intended to be executed as root.

      • Zozano@lemy.lol
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        1
        ·
        8 months ago

        I pay for ProtonVPN, and I still run my traffic through OpenVPN.

        Hate to victim blame, but unless you’re going to audit every line of code yourself, don’t use obscure software.

        • Faresh@lemmy.ml
          link
          fedilink
          English
          arrow-up
          10
          ·
          edit-2
          8 months ago

          As TonyTonyChopper this thread said, sometimes that obscure software is what you are required to use in your institution, or they don’t offer support for anything else.

      • kingorgg@feddit.uk
        link
        fedilink
        English
        arrow-up
        6
        ·
        8 months ago

        Magento is the e-commerce platform. Adobe acquired it in 2018. Quite a few businesses use it.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    15
    ·
    8 months ago

    This is the best summary I could come up with:


    Researchers have unearthed Linux malware that circulated in the wild for at least two years before being identified as a credential stealer that’s installed by the exploitation of recently patched vulnerabilities.

    Last Friday, Checkpoint Research revealed that the Linux version has existed since at least the same year, when it was uploaded to the VirusTotal malware identification site.

    Checkpoint went on to conclude that Magnet Goblin—the name the security firm uses to track the financially motivated threat actor using the malware—has installed it by exploiting “1-days,” which are recently patched vulnerabilities.

    “Magnet Goblin, whose campaigns appear to be financially motivated, has been quick to adopt 1-day vulnerabilities to deliver their custom Linux malware, NerbianRAT and MiniNerbian,” Checkpoint researchers wrote.

    In the past, Magnet Goblin has installed the malware by exploiting one-day vulnerabilities in Magento, Qlink Sense, and possibly Apache ActiveMQ.

    In the course of its investigation into the Ivanti exploitation, Checkpoint found the Linux version of NerbianRAT on compromised servers that were under the control of Magnet Goblin.


    The original article contains 453 words, the summary contains 168 words. Saved 63%. I’m a bot and I’m open source!

  • FrankTheHealer@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    3
    ·
    8 months ago

    It’s one of those ones where you have to install niche software and then not keep an eye on what your system is actually doing, isn’t it?

    • nyan@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 months ago

      Actually, that’s pretty much it. According to the article, it attacks a specific piece of ecommerce software (Magento), and I get the impression the attack isn’t viable if the software has all the latest fixes. So it’s dangerous only to a subset of servers.