TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Linux Trojan “Hand of Thief”

76 pointsby 16sover 11 years ago

12 comments

daekenover 11 years ago
&gt; The Linux operating system is designed to have high level of security. However, this year a few attempts to attack Web servers by backdoors redirecting traffic or malicious apache modules have been discovered. The aim of this Trojan is to compromise user desktop systems. With features designed to abuse sensitive browser information, it could advance Linux users a step forward in this specific environment. The same threatening environment in which Windows users have existed for years. The statement that the Linux platform is absolutely secure now seems even more illusive.<p>Once you have the ability to run code on a system (as someone dropping this trojan would), all bets are off. This has nothing to do with &quot;security&quot; and it&#x27;s quite misleading to say that it does. I&#x27;m no fan of Linux from a security perspective, but this story has no impact on the security posture of a Linux system, period.
评论 #6290761 未加载
评论 #6291138 未加载
评论 #6292044 未加载
lelfover 11 years ago
So first question came to mind: how do it inject code to processes? You need something for that: working exploit, CAP_SYS_PTRACE capability, you name it. Googling reveals just bunch of stupid articles that don&#x27;t mention what you need to “install” that trojan.<p>According to <a href="http://www.techrepublic.com/blog/linux-and-open-source/hand-of-thief-malware-could-be-dangerous-if-you-install-it/" rel="nofollow">http:&#x2F;&#x2F;www.techrepublic.com&#x2F;blog&#x2F;linux-and-open-source&#x2F;hand-...</a><p><pre><code> The good news is that Hand of Thief must have the root (or sudo) password in order to install. </code></pre> So how would it be? “Yow, just add this line to sources.list and run apt-get cool-hd-wallpapers-2013”?<p>Hello there. I&#x27;m the unix virus. Please sudo run me.
评论 #6290915 未加载
Arnorover 11 years ago
&gt; The statement that the Linux platform is absolutely secure now seems even more illusive.<p>What now? When did anyone ever claim Linux was &quot;absolutely secure&quot;? Second, how is an attack that depends on the user installing malicious software evidence of a security lapse in the system itself? If you&#x27;re just going to run anything I tell you to run, I&#x27;ll give you:<p>sudo rm -rf &#x2F;
评论 #6294259 未加载
评论 #6292229 未加载
babuskovover 11 years ago
I read the article twice, but failed to find the attack vector. How would you get infected by this, short of running it yourself manually?
评论 #6290738 未加载
评论 #6290810 未加载
评论 #6290768 未加载
评论 #6290952 未加载
adulauover 11 years ago
&quot;The known version of Hanthie is starting processes using a fake Kernel process in user-space called [flush-8:0] and starting from the init process instead of the kernel process. So the current detection can be performed from user-space with the following script:<p><pre><code> if [[ $(ps -eaf|grep &quot;\[flush&quot; | tr -s &quot; &quot; |cut -d&quot; &quot; -f 3|grep ^1$) ]]; then echo &quot;Infection suspected&quot;; else echo &quot;No infection suspected&quot;; fi</code></pre> &quot;<p>from <a href="https://www.circl.lu/pub/tr-15/" rel="nofollow">https:&#x2F;&#x2F;www.circl.lu&#x2F;pub&#x2F;tr-15&#x2F;</a>
WizzleKakeover 11 years ago
Can anyone explain how the form grabbing for Chrome works? For a code base as large as Chrome&#x27;s, how would one go about finding the function(s) involved with sending POST data? There was a thread on HN about a month ago about Hand of Thief which sparked my curiosity. I was able to write a crude form grabber for Firefox, but couldn&#x27;t figure out how to do it for Chrome.<p>For Firefox, I know about PR_Write (There&#x27;s some information for how to form grab Firefox under Windows which I found applicable). Since PR_Write function is in a shared library, you can use LD_PRELOAD to get Firefox to call your custom form-grabbing PR_Write, which can then call the original one.<p>Not trying to do anything malicious - just genuinely curious.
评论 #6291601 未加载
mistercowover 11 years ago
&gt;Immediately after start, the Trojan checks if it does not run in a virtualized environment<p>What would be the performance implications of running everything under a virtual machine on a very light host OS? The idea had not previously occurred to me, but it seems like there would be a ton of advantages to that, including increased security.<p>I know that some compatibility issues will vary depending on VM software, but from a pure performance perspective, what kind of loss are we looking at?
评论 #6294899 未加载
queeerkopfover 11 years ago
So as it seems &quot;commercial&quot; malware is coming to the linux desktop: Are there already any good, free anti virus programs for linux?<p>I had a quick look at <a href="http://www.clamav.net/" rel="nofollow">http:&#x2F;&#x2F;www.clamav.net&#x2F;</a> but it seems to target mainly windows stuff attached to mails and from some comments on the net isn&#x27;t that reliable at detecting known malicous stuff ...
评论 #6291284 未加载
评论 #6291966 未加载
评论 #6293188 未加载
gcb0over 11 years ago
TIL: create a scsi device named after the pattern virtual box uses and be immune to all trojans.
mb0over 11 years ago
The article states &quot;we observed an anti-monitoring check (no communication if wireshark or tcpdump is running)&quot;. Does anyone how how resistant it would be to logging of outbound connections with iptables?
chmikeover 11 years ago
How do we detect it&#x27;s presence ?
评论 #6291814 未加载
segmondyover 11 years ago
Much ado about nothing.