Hackers hijack Linux devices using PRoot isolated filesystems

Discussion in 'all things UNIX' started by Rasheed187, Dec 17, 2022.

  1. Rasheed187

    Rasheed187 Registered Member

    Is this some kind of new technique and is it a serious threat? I can't really picture it and I don't recall any similar attack technique on Windows.

    https://www.bleepingcomputer.com/ne...nux-devices-using-proot-isolated-filesystems/
     
  2. wat0114

    wat0114 Registered Member

    Underlining added by me.

    https://sysdig.com/blog/proot-post-explotation-cryptomining/

    So how do the threat actors gain access to the target device? Once again another article that fails to properly explain the attack vector from beginning to end. The bleepingcomputer article from the above link also fails to explain this. My feeling is the average Linux home user has nothing to worry about regarding this attack.
     
  3. Gringo95

    Gringo95 Registered Member

    "The attacks seen by Sysdig use PRoot to deploy a malicious filesystem on already compromised systems". Just more click-bait scaremongering.
     
  4. Daveski17

    Daveski17 Registered Member

    I figured as much.
     
  5. wat0114

    wat0114 Registered Member

    Agreed! :thumb:
     
  6. Daveski17

    Daveski17 Registered Member

    All FUD to induce Linux users to shell out spondoolies on 3rd party security programs. I think not. :rolleyes:
     
  7. reasonablePrivacy

    reasonablePrivacy Registered Member

    Hackers finally heard Linux users joke that they can not simply infect themeselves without compiling viruses first :argh:
     
  8. Rasheed187

    Rasheed187 Registered Member

    To clarify, I didn't think this was a threat to home users, but I wondered if this was a dangerous attack technique on Linux machines like servers for example. It's clear to me that you indeed first need to infect the target device before you can use this tool.
     
  9. Daveski17

    Daveski17 Registered Member

    :argh:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice