The Great Linux Mint Heist: the Aftermath
In a shocking move, cyber criminals recently hacked the Linux Mint Web server and used it to launch an attack against the popular distro's user base.
The hackers managed to alter the official Linux Mint Web site to point to an infected ISO image. The infected image contains a valid installation of Linux Mint 17.3 Cinnamon edition, along with the Tsunami IRC backdoor. The backdoor allows the cyber criminals to access the unsuspecting user's system, steal data and gain control over the software and hardware.
The hack occurred on the night of the 20th of February and was detected the next day. Any users who downloaded and installed Linux Mint 17.3 Cinnamon edition during that period are at risk. Users who installed Mint before or after that date are not at risk.
The Mint team responded by taking the site down while they worked to patch the hole. They worked for more than a week to make their Web servers much more secure. This involved isolating the specific weaknesses that allowed the attack and hardening their system against future abuses.
The Tsunami backdoor, which was installed on the infected ISO image, is usually used by attackers to launch distributed denial-of-service attacks (DDOS). These attacks use infected machines to flood Web servers with malicious traffic, preventing legitimate users from accessing services.
But Tsunami has other darker uses too. It provides access to the local filesystem and any sensitive information that may be installed on the computer.
The attack was made possible by a weakness in the WordPress blog used on the official Mint site. This weakness gave the attackers root access to the Web server. They used this to alter public files on the site, pointing a download link to a malicious FTP site in Bulgaria. Unsuspecting users would assume the link was valid, as it was posted on an official Web site.
Now that the official Linux Mint Web site has been fixed, the offending links are gone. Moving forward, the Mint team is working to improve the security of the installation process, so users can verify that they have downloaded a legitimate ISO before installing it.
In one sense, an increase in attacks against desktop Linux systems is to be expected. As the user base grows, Linux distros become a more tempting target to cyber criminals. That means users can't afford to be complacent and assume that "malware affects only Windows".
Users have to take every precaution to keep their systems up to date and secure. Distributors have to crack down on security weaknesses and make it harder to exploit Linux systems. And, everyone has to work together to respond to the inevitable attacks that will occur.
In spite of the attacks, Linux Mint is still a great choice for the security-conscious. As with any software, it's important for users and developers to remember to be cautious and practice good security.
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
|The Many Paths to a Solution||Sep 21, 2016|
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Readers' Choice Awards 2013
- Android Browser Security--What You Haven't Been Told
- Epiq Solutions' Sidekiq M.2
- The Many Paths to a Solution
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Securing the Programmer
- Nativ Disc
- Synopsys' Coverity
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide