A Windows XP help forum. PCbanter

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PCbanter forum » Windows 10 » Windows 10 Help Forum
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Linux Hacked Again. "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots



 
 
Thread Tools Rate Thread Display Modes
  #1  
Old August 2nd 18, 04:00 PM posted to alt.privacy.anon-server,comp.os.linux.advocacy,alt.os.linux,comp.os.linux.misc,alt.comp.os.windows-10
Peter Köhlmann[_3_]
external usenet poster
 
Posts: 235
Default Linux Hacked Again. "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots

Nomen Nescio wrote:

Security researchers have discovered the first IoT botnet
malware strain that can survive device reboots and remain on
infected devices after the initial compromise.

This is a major game-changing moment in the realm of IoT and
router malware. Until today, equipment owners could always
remove IoT malware from their smart devices, modems, and routers
by resetting the device.

The reset operation flushed the device's flash memory, where the
device would keep all its working data, including IoT malware
strains.

"Hide and Seek" malware copies itself to /etc/init.d/



Too bad that this directory contains no daemons anymore with systemd linux
versions. So this would raise alarms at once
Ads
  #2  
Old August 2nd 18, 07:17 PM posted to alt.privacy.anon-server,comp.os.linux.advocacy,alt.os.linux,comp.os.linux.misc,alt.comp.os.windows-10
chrisv
external usenet poster
 
Posts: 649
Default Linux Hacked Again. "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots

Peter Köhlmann wrote:

Nomen Nescio wrote:

Security researchers have discovered the first IoT botnet
malware strain that can survive device reboots and remain on
infected devices after the initial compromise.

This is a major game-changing moment in the realm of IoT and
router malware. Until today, equipment owners could always
remove IoT malware from their smart devices, modems, and routers
by resetting the device.

The reset operation flushed the device's flash memory, where the
device would keep all its working data, including IoT malware
strains.

"Hide and Seek" malware copies itself to /etc/init.d/


Too bad that this directory contains no daemons anymore with systemd linux
versions. So this would raise alarms at once


Is Android using systemd?

--
'Merging? There goes choice! Right? I mean choice is good... why
merge projects? I am mocking the "choice" mantra of the herd. But
before there were two choices - now there is one.' - some thing,
putting its ignorance on display
  #3  
Old August 2nd 18, 07:18 PM posted to alt.privacy.anon-server,comp.os.linux.advocacy,alt.os.linux,comp.os.linux.misc,alt.comp.os.windows-10
Melzzzzz[_3_]
external usenet poster
 
Posts: 119
Default Linux Hacked Again. "Hide and Seek" Becomes First IoT BotnetCapable of Surviving Device Reboots

On 2018-08-02, chrisv wrote:
Peter Köhlmann wrote:

Nomen Nescio wrote:

Security researchers have discovered the first IoT botnet
malware strain that can survive device reboots and remain on
infected devices after the initial compromise.

This is a major game-changing moment in the realm of IoT and
router malware. Until today, equipment owners could always
remove IoT malware from their smart devices, modems, and routers
by resetting the device.

The reset operation flushed the device's flash memory, where the
device would keep all its working data, including IoT malware
strains.

"Hide and Seek" malware copies itself to /etc/init.d/


Too bad that this directory contains no daemons anymore with systemd linux
versions. So this would raise alarms at once


Is Android using systemd?


No. It has it's own init system.



--
press any key to continue or any other to quit...
  #4  
Old August 2nd 18, 10:48 PM posted to alt.privacy.anon-server,alt.os.linux,comp.os.linux.misc,alt.comp.os.windows-10
Anonymous
external usenet poster
 
Posts: 41
Default Linux Hacked Again. "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots

Andreas Kohlbach presented the following explanation :
On Thu, 02 Aug 2018 13:17:30 -0500, chrisv wrote:

Peter Köhlmann wrote:

Nomen Nescio wrote:

The reset operation flushed the device's flash memory, where the
device would keep all its working data, including IoT malware
strains.

"Hide and Seek" malware copies itself to /etc/init.d/

Too bad that this directory contains no daemons anymore with
systemd linux versions. So this would raise alarms at once


Is Android using systemd?


Not yet. ;-)

We are the systemd, you will be assimilated. Resistance is futile.
[TM]


Escape route: Devuan, Slackware, +
  #5  
Old August 7th 18, 06:05 PM posted to alt.privacy.anon-server,alt.os.linux,comp.os.linux.misc,alt.comp.os.windows-10
Shadow
external usenet poster
 
Posts: 1,638
Default Linux Hacked Again. "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots

On Thu, 02 Aug 2018 16:48:56 -0500, Anonymous
wrote:

Andreas Kohlbach presented the following explanation :
On Thu, 02 Aug 2018 13:17:30 -0500, chrisv wrote:

Peter Köhlmann wrote:

Nomen Nescio wrote:

The reset operation flushed the device's flash memory, where the
device would keep all its working data, including IoT malware
strains.

"Hide and Seek" malware copies itself to /etc/init.d/

Too bad that this directory contains no daemons anymore with
systemd linux versions. So this would raise alarms at once

Is Android using systemd?


Not yet. ;-)


Doesn't need it. It was born with a TLA's eyes and ears.

We are the systemd, you will be assimilated. Resistance is futile.
[TM]


Escape route: Devuan, Slackware, +


I went Devuan. Though I had some bad crashes last week when it
updated a keyring program that now has systemd as a dependency .... I
can't reboot with the pretty little red icon anymore. Need to login as
root and type "reboot".
Still resisting.
[]'s
--
Don't be evil - Google 2004
We have a new policy - Google 2012
 




Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off






All times are GMT +1. The time now is 07:47 AM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 PCbanter.
The comments are property of their posters.