Hackers uncork experimental Linux-targeting malware

For discussions about security.
Post Reply
Message
Author
belham2
Posts: 1715
Joined: Mon 15 Aug 2016, 22:47

Hackers uncork experimental Linux-targeting malware

#1 Post by belham2 »

Hackers have unleashed a new malware strain that targets Linux-based systems.

The Linux/Shishiga malware uses four different protocols (SSH, Telnet, HTTP and BitTorrent) and Lua scripts for modularity, according to an analysis of the nasty by security researchers at ESET.

https://www.theregister.co.uk/2017/04/25/linux_malware/


Whhaaaat? ..... it uses LUA scripts????

User avatar
spiritwild
Posts: 181
Joined: Mon 03 Oct 2016, 10:06

#2 Post by spiritwild »


musher0
Posts: 14629
Joined: Mon 05 Jan 2009, 00:54
Location: Gatineau (Qc), Canada

Re: Hackers uncork experimental Linux-targeting malware

#3 Post by musher0 »

belham2 wrote:(...)Whhaaaat? ..... it uses LUA scripts????[/i]
Hi belham2.

Are you sitting in a comfortable chair? ;) Yes? Ok, here it goes:
Why go through the trouble of learning LUA when bash can do the job! :lol:
https://superuser.com/questions/223309/ ... e-in-linux

Sorry to break the news to you, but any computer language can be used for
good -- or for evil... C has been used in computer viruses for a long time,
but the malware kiddos could use bash, python, agena, J, etc., really any
kind of "run-time" interpreter that's on the victim's computer.

Sleep well now! :twisted:
musher0
~~~~~~~~~~
"You want it darker? We kill the flame." (L. Cohen)

User avatar
Flash
Official Dog Handler
Posts: 13071
Joined: Wed 04 May 2005, 16:04
Location: Arizona USA

#4 Post by Flash »

Properly speaking, they're not hackers, they're crackers.

User avatar
souleau
Posts: 148
Joined: Sun 23 Oct 2016, 15:24

Re: Hackers uncork experimental Linux-targeting malware

#5 Post by souleau »

musher0 wrote:Sorry to break the news to you, but any computer language can be used for
good -- or for evil... C has been used in computer viruses for a long time,
but the malware kiddos could use bash, python, agena, J, etc., really any
kind of "run-time" interpreter that's on the victim's computer.
Even something as innocent as an image on a webpage.

https://www.bleepingcomputer.com/news/s ... tribution/

belham2
Posts: 1715
Joined: Mon 15 Aug 2016, 22:47

#6 Post by belham2 »

Wait a minute.

Those virus-attack-vectors are all doable, but I use Puppies.

And Flash said having a puppy or two is safe.

I know he did.

I'll find it somewhere in the archives.

I know I am safe.

Puppy=safety from all bad things on the Internet.

Because we run 'em frgual.

And in RAM.

So when we get something funny going on.

We definitely no save on exit.

Thus, next boot we start freshy fresh new again.

Puppy reborn, as our paleo Pelo would opine.

Flash told us we would be safe.

Dammit, archives our so hard to....Pelo, need Pelo's help

Only good, honest people make and have puppies, right 8)

Pelo find so many old puppies still alive, all run by wholesome humans.

God has a puppy too

Must be.....

musher0
Posts: 14629
Joined: Mon 05 Jan 2009, 00:54
Location: Gatineau (Qc), Canada

#7 Post by musher0 »

@belham2:

Reading your last post: pelo to the rescue? :lol:
You must've been a stand-up comic in a former life!!!!

Image
musher0
~~~~~~~~~~
"You want it darker? We kill the flame." (L. Cohen)

Post Reply