Hackers hijack Linux devices using PRoot isolated filesystems

Discussion in 'all things UNIX' started by Rasheed187, Dec 17, 2022.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Is this some kind of new technique and is it a serious threat? I can't really picture it and I don't recall any similar attack technique on Windows.

    https://www.bleepingcomputer.com/ne...nux-devices-using-proot-isolated-filesystems/
     
  2. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    Underlining added by me.

    https://sysdig.com/blog/proot-post-explotation-cryptomining/

    So how do the threat actors gain access to the target device? Once again another article that fails to properly explain the attack vector from beginning to end. The bleepingcomputer article from the above link also fails to explain this. My feeling is the average Linux home user has nothing to worry about regarding this attack.
     
  3. Gringo95

    Gringo95 Registered Member

    Joined:
    May 7, 2009
    Posts:
    216
    "The attacks seen by Sysdig use PRoot to deploy a malicious filesystem on already compromised systems". Just more click-bait scaremongering.
     
  4. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    I figured as much.
     
  5. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,065
    Location:
    Canada
    Agreed! :thumb:
     
  6. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    All FUD to induce Linux users to shell out spondoolies on 3rd party security programs. I think not. :rolleyes:
     
  7. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
    Hackers finally heard Linux users joke that they can not simply infect themeselves without compiling viruses first :argh:
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    To clarify, I didn't think this was a threat to home users, but I wondered if this was a dangerous attack technique on Linux machines like servers for example. It's clear to me that you indeed first need to infect the target device before you can use this tool.
     
  9. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
    :argh:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.