Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Kaspersky warns of cross-platform (Linux/Windows) virus proof of concept
Computerworld ^ | APRIL 07, 2006 | Jaikumar Vijayan

Posted on 04/07/2006 12:34:25 PM PDT by Senator Bedfellow

APRIL 07, 2006 (COMPUTERWORLD) - Kaspersky Labs is reporting a new proof-of-concept virus capable of infecting both Windows and Linux systems.

The cross-platform virus is relatively simple and appears to have a low impact, according to Kaspersky. Even so, it could be a sign that virus writers are beginning to research ways of writing new code capable of infecting multiple platforms, said Shane Coursen, senior technical consultant at Kaspersky.

In a note on its Web site, the SANS Internet Storm Center (ISC) in Bethesda, Md,. said the new virus “is a sign the cross-platform aspects are becoming important. As the developers of viruses continue to research this, we will see more cross-platform malware come about in the future.”

The new virus, which Kaspersky calls Virus.Linux.Bi.a/Virus.Win32.Bi.a, is written in assembler and infects only those files in the current directory. “However, it is interesting in that it is capable of infecting the different file formats used by Linux and Windows,” Kaspersky said.

“It isn’t surprising that we are seeing a multiplatform virus,” given the growing popularity of Linux on enterprise desktops, Coursen said. “This is simply proof-of-concept code to show this kind of thing can be done.”

The new virus shows that malicious hackers may be exploring ways of getting new systems into bot networks, according to Johannes Ullrich, chief technology officer at the SANS ISC. But crafting such multi-platform malware is not particularly easy, he said.

“Writing a cross-platform worm is difficult because it limits you to functions that are available on both operating systems,” Ullrich said. “You have to also code the virus in assembly to make it work without relying on any OS-specific function,” he said.

The relatively small number of systems running on non-Windows platforms also makes it less appealing for hackers to go to the trouble of crafting cross-platform viruses, he said.

Though rare, this is not the first instance of such a virus appearing in the wild. In 2001, the sadmind/ISS worm exploited a hole in Sun Microsystems Inc.’s Solaris to infect systems running vulnerable versions of the operating system. Infected systems then scanned for and attacked servers running Microsoft Corp.’s IIS Web server software. That same year, another proof-of-concept virus named Winux infected both Windows and Linux systems.

“Even today, Web sites sending exploits to their visitors tend to detect what browser/platform the visitor is using and send a matching exploit to install some malware,” SANS said in its note.

It’s important for enterprises to be aware of such issues and implement anti-virus tools for protecting non-Windows operating systems if they haven’t done so already, Ullrich said.

“For those thinking their “pet” computer is invulnerable to the virus threat -- it’s not,” SANS said.


TOPICS:
KEYWORDS: linux; virus; windows
Per Slashdot.
1 posted on 04/07/2006 12:34:29 PM PDT by Senator Bedfellow
[ Post Reply | Private Reply | View Replies]

To: Senator Bedfellow

Since it's written in assembler, shouldn't this virus be more properly called an "x86 virus" rather than a "Windows virus" or a "Linux virus"?


2 posted on 04/07/2006 12:41:42 PM PDT by Redcloak (WARNING: This post may irritate John McCain.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Redcloak

I think the distinction is because it understands how to infect both sorts of executable files. Some other x86 operating system - e.g., OS X, BeOS, whatever - would presumably not be vulnerable.


3 posted on 04/07/2006 12:49:43 PM PDT by Senator Bedfellow
[ Post Reply | Private Reply | To 2 | View Replies]

To: Senator Bedfellow

I still don't see this as a problem since it only affects executables in your home directory. It would be different if it somehow could run those executables in a chroot or sudo environment. Then I'd be worried.


4 posted on 04/07/2006 12:54:19 PM PDT by BigTex5
[ Post Reply | Private Reply | To 1 | View Replies]

To: Redcloak

Exactly. This isn't going to work very well on a PowerPC or Sparc machine running Linux.


5 posted on 04/07/2006 1:02:10 PM PDT by B Knotts
[ Post Reply | Private Reply | To 2 | View Replies]

To: Senator Bedfellow

Now that all platforms are essentially running on Intel chips, I would expect virus writers to move to machine code. I'm surprised they haven't already.


6 posted on 04/07/2006 1:05:51 PM PDT by js1138 (~()):~)>)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BigTex5

Gotta be honest with you, and say that I've never really understood that logic. Basically, what you're saying is that it's okay if your investment records, tax returns, bank records, the kids' baby pictures, your father's will, your nearly complete Great American Novel, and the report you've been working on for six months, the one your boss is expecting on Friday - it's okay if all that stuff gets wiped out, as long as the core OS is safe. Nevermind that the OS would take you half an hour to reinstall in a pinch, whereas the stuff in your home directory may not be replaceable at all.


7 posted on 04/07/2006 1:08:06 PM PDT by Senator Bedfellow
[ Post Reply | Private Reply | To 4 | View Replies]

To: Senator Bedfellow

As with any sensitive data you should have a good backup plan. I do it for Winders as well as for Linux. CDs and DVDs are dirt cheap and are excellent backup media.


8 posted on 04/07/2006 1:22:53 PM PDT by BigTex5
[ Post Reply | Private Reply | To 7 | View Replies]

To: BigTex5

Well, yeah. I'm just saying that restricting and limiting the damage to the current user's home directory makes sense and is very valuable in a large, multi-user environment - you're toast, but at least everyone else is protected. OTOH, in a single-user environment, who cares if the OS is safe? Give me access to your home directory, and I'll wreck your whole day in such a way that still being able to boot up and log in won't do much to cheer you up ;)


9 posted on 04/07/2006 1:31:27 PM PDT by Senator Bedfellow
[ Post Reply | Private Reply | To 8 | View Replies]

To: Senator Bedfellow

It also only affects executables so anything you have in your home would be fine as long as its not a binary executable.


10 posted on 04/07/2006 1:40:09 PM PDT by BigTex5
[ Post Reply | Private Reply | To 9 | View Replies]

To: BigTex5

Presumably it's changing executables in order to propagate itself. Who knows what else it can be modified to do while executing?


11 posted on 04/07/2006 1:47:18 PM PDT by Senator Bedfellow
[ Post Reply | Private Reply | To 10 | View Replies]

To: Senator Bedfellow
Give me access to your home directory, and I'll wreck your whole day in such a way that still being able to boot up and log in won't do much to cheer you up ;)

As a virus, knock yourself out....

/dev/mapper/Volgrp0-home /home xfs rw,noexec,nosuid 0 2

12 posted on 04/11/2006 3:35:27 AM PDT by Knitebane (Happily Microsoft free since 1999.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Knitebane

That works because it can't traverse directories for the moment. Give it that ability, land it in /usr/bin, and watch it zero out your home directory. Obviously, that's easier said than done, but it'll get you there.


13 posted on 04/11/2006 11:17:17 AM PDT by Senator Bedfellow
[ Post Reply | Private Reply | To 12 | View Replies]

To: Senator Bedfellow
That works because it can't traverse directories for the moment. Give it that ability, land it in /usr/bin, and watch it zero out your home directory. Obviously, that's easier said than done, but it'll get you there.

MUCH easier said than done. On a standard Linux system root owns all of the bin directories. The virus would have to escalate to root privledges just to write there.

I'd worry more about a meteorite crashing into my PC.

14 posted on 04/13/2006 3:21:32 PM PDT by Knitebane (Happily Microsoft free since 1999.)
[ Post Reply | Private Reply | To 13 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson