Is there an exhaustive list of malware targeting linux?
I just finished reading about some security stuff and it seems linux is as easy to infect as any windows machine.
Is there an exhaustive list of malware targeting linux?
Other urls found in this thread:
malware.wikia.com
ranum.com
twitter.com
What the fuck did you "read"? That Linux myths shill video? Your average GNU/Linux installation is more secure than your average Windows installation by virtue of not dropping the user straight into an administrator account. Also the fact that software is usually installed from trusted sources and not from "totally trustworthy" cracking groups.
Then why is there a plethora of worms/rootkits to gain root on Linux?
Face it, both systems are vulnerable as hell.
Because they may be using kernel exploits that got patched on day one?
It is not really a question of writing it or infecting a single machine. Most remote control software would identify as malware if used for that purpose and there are ways that you can hide them from the users. Also there will always be kernel exploits.
But in order to write self propagating malware you need to start thinking about transmission, and how to stay undetected.
How many linux users would open money.pdf.deb and how fast would an 0-day be detected? It is just not worth the investment.
smh tbh fam
malware.wikia.com
I'd say there is a fair chance that freetards on this board are not even aware how vulnerable their super sekrit gahnoo loohnix really is.
security through obscurity xDDDDDDDDDDDDDDD
it works for traffic lights, it works for gentoo
You should have received 0.02$ on your account. Thanks for your works.
-Microsoft
...
Dude, don't you know? Something could could have happened = Something did happen, that's why Wikipedia is always right.
Because Linux is a very useful operating system to break into. Most public web servers run Linux.
No matter how secure an operating system is, it would get tons of rootkits if it were used for the same purposes and at the same usage level of Linux. That is because there are a lot of ways to break into a system that are entirely the fault of the user or the application.
An operating system can't protect against SQL injection, buffer overflows, private keys that were committed to Github, copy/pasted example passwords, and all sorts of other problems. It can provide facilities to lessen the impact but not all users will use them. Lots of users are careless, or just stupid. Lots of programs that are not part of the operating system have security holes.
A rootkit is something you install once you have root, not something you use to get root.
There is plenty of malware that target *nix distros, but the vast majority of them are sent via remote exploits due to the fact that the majority of the linux market share are servers. I have written malware for *nix machines in the past, it is not difficult. The target audience is just different. I can go into detail if you like.
...
haah, that's clever
Any of them directly targeting the network stack or did they just exploit services listening on a port running as root?
post examples, and, even better, solutions.
Please do.
This is the main advantage of Linux - the patches get found and applied WAY faster for a legitimate kernel/coreutils/whatever CVE. Most of the exploits are just fucking with some shitty third party code or social engineering.
Well there's a lot of Linux-based routers, appliances, and "Internet of things" devices that'll never get patched...