Based on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices.
@Lifecoach5000@lemmy.world
link
fedilink
English
14
edit-2
9M

So as a new Linux guy that just has Ubuntu installed on a laptop running media server, sounds like I shouldn’t be worried since it is NAT’d behind my router and this worm compromises telnet and SSH connections. Am I getting the gist right? Totally newb here again.

Systems with exposed SSHd, but also properly configured, are also not at risk.

@Kethal@lemmy.world
link
fedilink
English
4
edit-2
9M

People are giving some advice but it doesn’t seem appropriate for an absolute newbie. Here’s what I’d say. Absolutely do not run telnet. Because it’s so insecure and everyone knows that, it’s usually not on by default, and you would have had to start it yourself somehow. It’s unlikely that you did that, but you can check to see.

If you’re new, you very likely don’t need an SSH server running. Unless you’re logging into that computer remotely, you don’t need it. It’s probably not running, but it’s conceivable that it could run by default. Check to see and disable it if you don’t need remote login.

If you do need remote login, use SSH and use a very good password. Ideally, you’d need to leave newbie territory and use public-private keys instead of a password. It’s also not a bad idea to use a nonstandard port, instead of 22. That doesn’t beef security much, but many scanners are going to look for 22 and nothing else.

Thank you for the well thought out response! I, myself do know my way around networking a bit. Linux in general is what I am just now dipping my toes in. Loving it and learning a lot.

@foggy@lemmy.world
link
fedilink
English
19M

Can you connect to your server when not on your network?

If no, you’re definitely ok.

Hard to tell at a glance.

The telnet vulnerability allows it to infect some older IoT devices (such as CCTV cameras) or if you are using an older router where telnet is enabled (or may be enabled by default). Most modern devices don’t use that method anymore due to security concerns.

The SSH vulnerability can affect a lot more devices. So if you have a Raspberry Pi on your network with a default account/password or a weak password then it can infect that and spread to other devices on your local network. Or maybe a cheap IoT device that has weak security… same problem.

A concern for you is if you have some other device on your network that was vulnerable, because then that device can serve as a point for the worm to jump to your other devices (if they also use default passwords or weak passwords).

Another big question to ask is whether you have UPnP enabled on your router.

Either way I would make sure that you have strong passwords, change the default username, etc, on all of your devices.

@mlfh@lemmy.ml
link
fedilink
English
729M

This is just an attack that attempts common username/password combinations on ssh, and the article even states that the worm is dime-a-dozen. Unless you have both password auth enabled and an available account with an easily guessable password (and if you have either you should change that), this is nothing to worry about, even with sshd available to the internet.

Sensationalist title.

@Dasnap@lemmy.world
link
fedilink
English
89M

Hell, even having a lax fail2ban stops these attacks.

@ichbinjasokreativ@lemmy.world
link
fedilink
English
17
edit-2
4d

deleted by creator

A million attacks a day have done this for the past 20 years. ssh + bad password is so old it can drink in the US.

ssh-keygen is your friend, pretty much no reason not to use it.

/ laughs in immutable Linux

What use is an immutable system, if it doesn’t already have the data on it that an attacker can steal?

@excitingburp@lemmy.world
link
fedilink
English
1
edit-2
9M

Worms are near impossible to install on an immutable system. You can’t just write to /usr/share/bin or some other truck to hide your binary. It doesn’t help at all with exfiltration

Your last sentence is exactly my point.

@terminhell@lemmy.world
link
fedilink
English
49M

I’m guessing, per the article, that as long as you’re not exposing telnet/ssh directly, you should be ok? If you’re doing that already, why? I could see having some iot device that isn’t properly segmented from the rest of your lan already problematic, and something like this would be a concern.

@Squizzy@lemmy.world
link
fedilink
English
-159M

I shouldn’t be on Linux, I don’t know anything about computers. This is why Windows is the safer bet.

@CluckN@lemmy.world
link
fedilink
English
09M

By Jehovah you can’t say that on Lemmy!

Create a post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


  • 1 user online
  • 191 users / day
  • 586 users / week
  • 1.37K users / month
  • 4.49K users / 6 months
  • 1 subscriber
  • 7.41K Posts
  • 84.7K Comments
  • Modlog