this post was submitted on 18 Sep 2023
170 points (98.3% liked)

Linux

56362 readers
1339 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 6 years ago
MODERATORS
all 11 comments
sorted by: hot top controversial new old
[–] AbidanYre@lemmy.world 37 points 2 years ago (2 children)
[–] PoorlyWrittenPapyrus@lemmy.world 37 points 2 years ago (2 children)

Free as in freedom malware

[–] furikuri@programming.dev 2 points 2 years ago

An amendment to the popular expression, "All [personal] information should be free", I suppose

[–] autotldr@lemmings.world 31 points 2 years ago (1 children)

This is the best summary I could come up with:


Researchers from NHS Digital in the UK have said Trochilus was developed by APT10, an advanced persistent threat group linked to the Chinese government that also goes by the names Stone Panda and MenuPass.

In June, researchers from security firm Trend Micro found an encrypted binary file on a server known to be used by a group they had been tracking since 2021.

The Linux malware ported several functions found in Trochilus and combined them with a new Socket Secure (SOCKS) implementation.

The Trend Micro researchers eventually named their discovery SprySOCKS, with “spry” denoting its swift behavior and the added SOCKS component.

Besides showing interest in espionage activities, Earth Lusca seems financially motivated, with sights set on gambling and cryptocurrency companies.

Monday’s Trend Micro report provides IP addresses, file hashes, and other evidence that people can use to determine if they've been compromised.


The original article contains 537 words, the summary contains 143 words. Saved 73%. I'm a bot and I'm open source!

[–] Shdwdrgn@mander.xyz 24 points 2 years ago

A Chinese government group, you say? They shall henceforth be known as Stone Pooh.

[–] CurlyChopz@programming.dev 27 points 2 years ago

Just you wait till you see the deep web forum users like "I backdoored Arch btw"

[–] GnuLinuxDude@lemmy.ml 17 points 2 years ago (1 children)

Did I miss it in the article? I cannot determine what the attack vector is. Am I downloading a malicious file? Am I running an insecure publicly facing service?

[–] placatedmayhem@lemmy.ml 15 points 2 years ago (1 children)

This is the backdoor that's deployed after a host is compromised. How the host is compromised is somewhat irrelevant. It could be exploited manually, social engineering, a worm, etc.

[–] GnuLinuxDude@lemmy.ml 5 points 2 years ago

Ok, makes sense. Thanks for clarifying.