{"id":16568,"date":"2019-10-10T10:54:09","date_gmt":"2019-10-10T18:54:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10307\/"},"modified":"2019-10-10T10:54:09","modified_gmt":"2019-10-10T18:54:09","slug":"news-10307","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/10\/news-10307\/","title":{"rendered":"Guest blog: Why we should be paying more attention to Linux threats"},"content":{"rendered":"<p><em>In a guest blog post VB2019 Silver partner <a href=\"https:\/\/www.intezer.com\/\" target=\"_blank\">Intezer <\/a>outlines the importance of paying more attention to Linux threats.<\/em><\/p>\n<p>\u00a0<\/p>\n<p>In a previous <a href=\"https:\/\/rhisac.org\/blog\/hiddenwasp-and-the-emergence-of-linux-based-threats\/\" target=\"_blank\">blog post<\/a> written for the Retail and Hospitality Information Sharing and Analysis Center (RH-ISAC), we discussed the emergence of <em>Linux<\/em>-based threats.<\/p>\n<p>This threat ecosystem is heavily concentrated with financially driven cryptominers and DDoS botnet tools which primarily target vulnerable <em>Linux<\/em> servers. In addition, more sophisticated threats utilizing rare evasion techniques exist within the <em>Linux<\/em> platform, evidenced by the recent discoveries of <a href=\"https:\/\/www.intezer.com\/blog-hiddenwasp-malware-targeting-linux-systems\/\" target=\"_blank\">HiddenWasp<\/a>, and the <a href=\"https:\/\/www.intezer.com\/blog-seizing-15-active-ransomware-campaigns-targeting-linux-file-storage-servers\/\" target=\"_blank\">QNAPCrypt <\/a>ransomware campaigns targeting <em>Linux<\/em>-based file storage systems (NAS servers).<\/p>\n<p>\u00a0<\/p>\n<p>In the anti-virus industry, a large emphasis is placed on protecting <em>Windows<\/em> endpoints, and rightfully so \u2014 <em>Windows<\/em> desktop users comprise approximately 87% of the total <a href=\"https:\/\/netmarketshare.com\/operating-system-market-share.aspx?options=%7B%22filter%22%3A%7B%22%24and%22%3A%5B%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Desktop%2Flaptop%22%5D%7D%7D%5D%7D%2C%22dateLabel%22%3A%22Trend%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22platform%22%2C%22sort%22%3A%7B%22share%22%3A-1%7D%2C%22id%22%3A%22platformsDesktop%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart%22%3A%222018-09%22%2C%22dateEnd%22%3A%222019-08%22%2C%22segments%22%3A%22-1000%22%7D\" target=\"_blank\">desktop market share<\/a>, in comparison to the 2% market share held by <em>Linux<\/em> desktop users. Because of this disparity, and the fact that we rarely see malware targeting <em>Linux<\/em> end-users, some security professionals argue that <em>Linux<\/em> is the safest and most secure operating system.<\/p>\n<p>However, when discussing threats to the <em>Linux<\/em> platform, we must understand that <em>Linux<\/em> desktop usage is a very small piece of the puzzle. <em>Linux<\/em> makes up about 70% of the <a href=\"https:\/\/w3techs.com\/technologies\/overview\/operating_system\/all\" target=\"_blank\">web server market share<\/a>, and according to <em>CBT Nuggets<\/em>, 90% of <a href=\"https:\/\/www.cbtnuggets.com\/blog\/certifications\/open-source\/why-linux-runs-90-percent-of-the-public-cloud-workload\" target=\"_blank\">all cloud servers<\/a>. In a 2018 article, <em>ZDNet<\/em> <a href=\"https:\/\/www.zdnet.com\/article\/linux-now-dominates-azure\/\" target=\"_blank\">reported <\/a>that <em>Linux<\/em> is the most popular operating system on <em>Microsoft<\/em>&#8216;s <em>Azure Cloud<\/em>.<\/p>\n<p>\u00a0<\/p>\n<p>In recent years, there has been a rapid growth in modern, cloud-based infrastructure. <em>Linux<\/em> has emerged as the predominant choice for cloud computing for two reasons:<\/p>\n<p>\u00a0<\/p>\n<p>The quick migration to the cloud, coupled with a lack of awareness into <em>Linux<\/em> instances and the threats that target these systems, have contributed to the low detection rates seen in the vast majority of security vendors.<\/p>\n<p>Focus on Windows endpoints. In general, there are not many Linux protection systems, and as a result the evasion techniques are rudimentary in nature. The majority of security solutions are focused on protecting Windows environments\u20141) because Windows holds the majority of the desktop market share, and 2) since the cloud is a relatively new development. In addition, security vendors try to adapt their Windows tools to fit the Linux platform, but Linux is very different. As a result, these solutions are not as effective at detecting threats as they are in the Windows domain. Organizations require a tailored solution for Linux, not an adapted Windows technology.<\/p>\n<p><strong>Big picture.<\/strong> For enterprises that host their data on the cloud, there is a strong possibility that they are using a <em>Linux<\/em> server. Without proper detection and response mechanisms in place, organizations&#8217; cloud infrastructures can be exposed, making them more vulnerable to data breaches.<\/p>\n<p>\u00a0<\/p>\n<p>In an open-source ecosystem like <em>Linux<\/em>, there are large amounts of publicly available code that can quickly be copied and reused by adversaries in order to produce their own malware. In the case of HiddenWasp, the authors behind the malware reused large portions of code from open-source Mirai and the Azazel rootkit. While Mirai is not a highly complex malware, its code was previously leaked in 2016, and we often see the code being reused by attackers to deploy their own instances of Mirai, especially within the <em>Linux<\/em> platform.<\/p>\n<p>In the world of software development, developers are incentivized to reuse code. Reusing code brings tools to market faster. The same principle applies to malware authors. Especially on the <em>Linux<\/em> platform, where detection rates have been consistently low, attackers have become less concerned about implementing excessive evasion techniques. Even when the attackers reuse extensive amounts of code, threats have managed to stay relatively undetected.<\/p>\n<p>The majority of cyber attacks, whether they are targeting <em>Linux<\/em> or <em>Windows<\/em> systems, contain code from previous threats. As defenders of these environments, it&#8217;s critical to analyse the binary code that is being used in these attacks. By identifying and then indexing an attacker&#8217;s code, defenders can detect any future variant of the threat that uses even the smallest amounts of the same code.<\/p>\n<p>This code reuse detection approach, which we call &#8216;genetic malware analysis&#8217;, is particularly relevant for detecting and classifying <em>Linux<\/em> threats, because, as we have seen in the cases of HiddenWasp and Mirai, <em>Linux<\/em> malware authors will reuse code.<\/p>\n<p>In another example, an <a href=\"https:\/\/analyze.intezer.com\/#\/\" target=\"_blank\"><em>Intezer Analyze<\/em> <\/a>community user recently detected a <a href=\"https:\/\/analyze.intezer.com\/#\/files\/b90fde98e25a7b7ff6af97e04fa7699b44e0457d3e12de043df38d6270df9ce9\" target=\"_blank\">GonnaCry ransomware sample<\/a>. GonnaCry is an open-source ransomware designed for the <em>Linux<\/em> platform. GonnaCry&#8217;s source code is downloaded from <em>GitHub<\/em> and utilized by attackers to infect vulnerable <em>Linux<\/em> endpoints by encrypting their file systems. At the time of detection, this sample had 0\/55 detections in <em>VirusTotal<\/em>. However, the sample was immediately flagged in our system because it shared 453 genes, or over 47% of its code, with previous instances of the GonnaCry ransomware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/148da16332b4bf44ae1ee4388a6ae8f0_f3749.png\" alt=\"Screen-Shot-2019-09-19-at-1.39.30-PM-1024x529.png\" width=\"680\" height=\"351\" \/><\/p>\n<p>\u00a0<\/p>\n<p>In addition to adopting a genetic malware analysis approach, organizations can implement the following security best practices in order to mitigate the cyber threats targeting <em>Linux<\/em>-based systems:<\/p>\n<p>\u00a0<\/p>\n<p>The world of IT is changing quickly as more organizations host their data and files on the cloud. <em>Linux<\/em>, in particular, has emerged as the popular choice for cloud servers, even among <em>Microsoft<\/em> cloud computing services. Since <em>Linux<\/em> comprises nearly 90% of the cloud server market share, the majority of enterprises that host their data on the cloud are likely operating from a <em>Linux<\/em> server.<\/p>\n<p>While the majority of security solutions are focused on detecting threats residing in <em>Windows<\/em>, particularly on <em>Windows<\/em> desktops, a greater emphasis needs to be placed on spreading awareness of <em>Linux<\/em> machines and threats. As defenders, we lack research and critical IOCs that can help us to better comprehend, detect and respond to <em>Linux<\/em> threats, more consistently, and on a greater scale.<\/p>\n<p>As evidenced by the recent discoveries of HiddenWasp and QNAPCrypt, with improved visibility and detection rates we can expect to see new and advanced malware being created to target the <em>Linux<\/em> platform. However, we must also remember that <em>Linux<\/em> is an open-source ecosystem, where attackers will continue to reuse publicly available code to deploy new instances of malware. This is what makes indexing code seen in previous attacks so important for detecting future <em>Linux<\/em> threats.<\/p>\n<p>By applying a genetic malware analysis approach, and adhering to the mitigation recommendations outlined in this blog, users of <em>Linux<\/em>-based systems \u2014 particularly organizations hosting their data on <em>Linux<\/em> cloud servers \u2014 can better protect themselves from the threats posed by this emerging landscape.<\/p>\n<p>\u00a0<\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/09\/guest-blog-why-we-should-be-paying-more-attention-linux-threats\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/148da16332b4bf44ae1ee4388a6ae8f0_f3749.png\"\/><br \/>                                 In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying attention to Linux threats.                <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/09\/guest-blog-why-we-should-be-paying-more-attention-linux-threats\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-16568","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16568"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16568\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16568"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}