Language Selection

English French German Italian Portuguese Spanish

The First Linux Botnet

Filed under
Software

They're calling it the first botnet designed for broadband equipment and routers, and that it is. But it's the first of something else: psyb0t, the first Linux botnet.

And even though it's running on hardware devices, and even though it's running on Linux, and an obscure distribution of Linux at that, the basic mechanisms of it aren't that different from "conventional" botnets that run on Windows PCs. There's a lesson here.

Linux seems to be a great platform for these little embedded devices. It's small enough that it can fit in economical hardware, portable enough that you can put it on almost any processor and platform, and it's got great networking tools. This particular bot runs on Linux Mipsel devices ("Mipsel" is the port of Debian Linux on MIPS processors). But it's not hard to see the same thing happening to any sufficiently large population of Internet-facing devices based on Linux or any other platform. I'm especially curious about DVRs now.

We often speak about how malware writers write for Windows because that's where the systems are and because that's where the development tools are, for malware and more generally. The same could be said now of Linux.

rest here




More in Tux Machines

Today in Techrights

10 Best Free Photo Editors For Linux

Linux has come a long way in terms of the applications that are available for the platform. Whatever your specific needs are, you can be sure that there are at least a few applications available for you to use. Today, we'll look at 10 free photo editors for Linux, and I must say, there are a lot of image editing tools available. This post selects just 10 of these awesome tools and talks about them briefly looking at what makes them stand out. In no particular order, let's get started. Read
more

Security: Adobe and Apple Fail/Fare Badly

  • In spectacular fail, Adobe security team posts private PGP key on blog
    Having some transparency about security problems with software is great, but Adobe's Product Security Incident Response Team (PSIRT) took that transparency a little too far today when a member of the team posted the PGP keys for PSIRT's e-mail account—both the public and the private keys. The keys have since been taken down, and a new public key has been posted in its stead.
  • Hackers Using iCloud's Find My iPhone Feature to Remotely Lock Macs and Demand Ransom Payments
    Over the last day or two, several Mac users appear to have been locked out of their machines after hackers signed into their iCloud accounts and initiated a remote lock using Find My iPhone.  With access to an iCloud user's username and password, Find My iPhone on iCloud.com can be used to "lock" a Mac with a passcode even with two-factor authentication turned on, and that's what's going on here.

Games: Open Source Puzzle Games and SDL 2.0.6 Release

  • Improve Your Mental Mettle with These Open Source Puzzle Games
    The puzzle genre often tests problem-solving skills enhancing both analytical and critical thinking skills. Word completion, pattern recognition, logical reasoning, persistence, and sequence solving are some of the skills often required to prosper here. Some games offer unlimited time or attempts to solve a puzzle, others present time-limited exercises which increase the difficulty of the puzzle. Most puzzle games are basic in graphics but are very addictive.
  • SDL 2.0.6 Released With Vulkan Helpers, DRM/KMS Driver
    SDL 2.0.6 was released on Friday as the latest feature update for this widely-used library that allows for more cross-platform portability of applications and games centered around input, audio, and video helpers.