Hackers hijack Linux devices using PRoot isolated filesystems

Corrine

Administrator,
Microsoft MVP,
Security Analyst
Staff member
Joined
Feb 22, 2012
Posts
12,393
Location
Upstate, NY
Via Bleeping Computer at Hackers hijack Linux devices using PRoot isolated filesystems:

Hackers are abusing the open-source Linux PRoot utility in BYOF (Bring Your Own Filesystem) attacks to provide a consistent repository of malicious tools that work on many Linux distributions.

A Bring Your Own Filesystem attack is when threat actors create a malicious filesystem on their own devices that contain a standard set of tools used to conduct attacks.

This file system is then downloaded and mounted on compromised machines, providing a preconfigured toolkit that can be used to compromise a Linux system further.

"First, threat actors build a malicious filesystem which will be deployed. This malicious filesystem includes everything that the operation needs to succeed," explains a new report by Sysdig.

"Doing this preparation at this early stage allows all of the tools to be downloaded, configured, or installed on the attacker's own system far from the prying eyes of detection tools."

Sysdig says the attacks typically lead to cryptocurrency mining, although more harmful scenarios are possible.

The researchers also warn about how easy this novel technique could make scaling malicious operations against Linux endpoints of all kinds.
More info at the referenced article.
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top