Korean Mozilla Binaries Infected 592
Magnus writes "Korean distributions of Mozilla and Thunderbird for Linux were infected with Virus.Linux.RST.b. This virus searches for executable ELF files in the current and /bin directories and infects them. It also contains a backdoor, which downloads scripts from another site, and executes them, using a standard shell."
And so it begins... (Score:4, Insightful)
Let the thrashing begin! (Score:4, Insightful)
Whatever.
Considering this only affects one operating system (Linux) and occured in only one area of the world (Korea), despite this flaw it's still a whole bunch better than getting an update for IE our Outlook and having everyone who uses Windows, regardless of where they are in the world, being infected.
Every OS needs protection (Score:2, Insightful)
Re:This proves ... (Score:2, Insightful)
Re:Everything is vulnerable. (Score:1, Insightful)
Re:Virus data (Score:5, Insightful)
You mean besides the fact that the binaries were removed as soon as they found out?
Permissions? (Score:4, Insightful)
Um... (Score:5, Insightful)
Infecting /bin? (Score:5, Insightful)
Nothing new here....if you install software as root from a compromised source and don't check the md5sums along with other precautions you put yourself at risk
Re:And so it begins... (Score:3, Insightful)
Re:Secure.. (Score:3, Insightful)
It is. The fact that the only way for it to be effective is to pre-infect the original distribution. Which means someone miscopulated the canine. Still cant get around human fallibility in that regard.
Linux is still much more secure in its raw state than almost any closed-source product even after post-install configuration. Anyone with a modicum of experience with a fresh *nix installation will likely spot this before it does any real damage.
Suppose it was only a matter of time before someone figured this out though. Goes to show you, it is not a good idea to hook any system up to a network or the web before you finish the basic post-install configurations.
Re:First time real-world linux virus spread? (Score:4, Insightful)
It is a 3 years old thing and it never spread, why should it now?
It has been found somewhere on some server in some package.
OK, then?
Distros build their version of softwares from source, they check the sources, their users get their software from their distro.
End of the story.
Moral of the story:
-don't download binaries from other sources than your distro.
-don't install binaries from other sources than your distro as root.
Re:6 stories down on the front page (Score:3, Insightful)
You're fine?!? (Score:1, Insightful)
Uh, but don't you need write access to be able to install the infected mozilla executables? Even if it can't infect executables, having your web browser infected is more than bad enough since you typically enter all sorts of "interesting" information in your browser. How is this "fine"?
Re:Um... (Score:5, Insightful)
file permission... (Score:2, Insightful)
Re:Virus data (Score:3, Insightful)
Of course saying the reverse here will quickly get you troll/flamebait/overated down to -1.
Tinfoil shoes? (Score:5, Insightful)
OK, really paranoid, conspiracy-theory thought here... Yesterday, Symantec, a vendor with an AV product, releases a report claiming that Mozilla is not as secure as IE. Today, a news story comes out that a download of Mozilla from some website in Korea has been trojaned. Anyone else wondering if Symantec placed the infected files in Korea to boost sales of either their Linux AV product (haven't checked to see if there is one yet) or their security consluting services?
My late-night googling skills are failing to find a reference, but I remember some stories from a couple years back about AV companies writing and releasing new viruses to pad their list of known viruses. If that was true, then I wouldn't put a stunt like this past them.
Oy... (Score:3, Insightful)
Come on...this isn't rocket surgery. Use some common sense.
Re:And so it begins... (Score:5, Insightful)
Re:Virus data (Score:5, Insightful)
A third party, a mozilla fan site in korea, distributed infected binaries.
If you find an infected version of Winzip on an internet site, would you blame Winzip.com ?
Checksums do not exists for nothing. (Score:3, Insightful)
Unfortunately this part can't be fully automatised, because you would rely on the untrusted package to find the originator sources which can be facked, obviously..
If the installation on Linux was standardised maybe just asking the user where is the originator website of the software.
But Linux's distribution can't even standardised on a common packaging format, so standardising on a common installation tool is a pipe dream..
Alan Cox was right (Score:5, Insightful)
I use a lot of OS software (e.g. Firefox, NeoOffice/J, LyX, R), but the standard installation process on my platform (OS X) does not allow checking for an authentic signature. Why is this not built in? It doesn't have to be this way: for instance, Red Hat signs its own RPMs (though Debian's APT didn't support this last time I looked).
We already have to trust the developers. We shouldn't have to trust every FTP server too.
Re:No, no, no... Windows is as secure. (Score:2, Insightful)
Re:6 stories down on the front page (Score:4, Insightful)
How is this different?
If Microsoft did it, it would be Microsoft. (Score:5, Insightful)
This is not about Mozilla distributing infected binaries. Mozilla did not. If they had, your analogy would be correct.
This is about a 3rd party site distributing binaries of compiled Mozilla code that were infected.
The only Microsoft comparision that can be made would be if HP (or some OEM) shipped WinXP computers with a virus.
The real question is how did that virus get there in the first place. It's been around for a while but it doesn't spread.
This couldn't happen to us? (Score:1, Insightful)
And I thought part of the OSS religion was diligence and persistence in security. M$ are the ones that deny the problem exists and do nothing about it right? Well, RIGHT?
The emperor has no clothes!
--russ
Re:More evidence that Mozilla is NOT secure by des (Score:3, Insightful)
Re:Some stuff (Score:3, Insightful)
Besides, Microsoft is constantly broadcasting the message that Linux sucks, and they are paying billions a year to have that message repeated wherever they can. Do you expect Linux supporters to just respond once and then shut up?
Microsoft has bought the airwaves, print publications, billboards, and face time to get their message across. Leave the rest of us a little space on discussion groups for expressing our views.
You don't understand "vulnerable". (Score:5, Insightful)
Getting that virus onto someone else's box is very difficult.
Getting that virus to spread from that box is even more difficult.
Linux viruses have an infection rate that is lower than their removal rate so they die in the wild.
The real question is how did that virus get into that code? Linux viruses tend to have total infection numbers of less than 100 machines.
Re:Virus data (Score:5, Insightful)
Let's compare apples to apples here. If MS was offering infected binaries form one of THEIR sites, yes, we'd be jumping down their throat. On the other hand, if MS decided to let Download.com distribute versions of a "freeware" application (like Messenger), and the binaries on Download.com were infected, most of us would just be avoiding Download.com like the plague. Sure, some people would still blame Microsoft, just as some people are going to blame Mozilla here.
Now, having said all of that, I'll bring up the question of accountability. Since Mozilla is being distributed by public mirrors, it's probably a REALLY good idea to have some sort of guidelines that need to be met by the administrators to make sure this doesn't happen on a "Mozilla-certified" mirror. Maybe this is already in place.
Re:So let me get this straight... (Score:5, Insightful)
That's a falacy. Linux is just as vunerable to trojaned installers as any other OS. You install mozilla as root, right? Debian apt runs as root, so you'd better be trusting those apt repositories, and all of the contributers.
OS security does help against worms and other methods of infection, but dealling with trojans is a 90% user function. This improved security, along with market share (as you point out) is what makes Linux "safer". To get a virus on Linux, you essentially have to do something wrong yourself. Which is no consolation to the gran and grandpa users, "Download Weather Bar (linux version) popups" are only a few years away...
And that is "insightful"? (Score:3, Insightful)
ActiveX is a stupid security model. That is why so many exploits for it exist and why you have to keep your anti-virus signatures updated every day.
There is no equivalent in FireFox.
Anyone, anywhere can put up infected FireFox binaries. Whether anyone will ever download and install them is another matter.
www.mozilla.or.kr is not an official Mozilla site (Score:3, Insightful)
People have complained in the past about the Mozilla organisation being heavy handed about trademarks, and trademarks (eg the Linux one) have been getting a bad rap in general. But here's the other side of the coin - the actions of an organisation that identify themselves as "Mozilla", even though they're _not_ the Mozilla foundation, are tarnishing the reputation of the genuine article.
Re:Secure.. (Score:2, Insightful)
Severe enough
Re:Black day for Unix Firefox users (Score:1, Insightful)
Re:Virus data (Score:5, Insightful)
I think too many Linux admins don't believe there's such a thing as a Linux virus. Usually the easiest way to recognize the infection is if a large number of common programs in
Apples to Apples? (Score:5, Insightful)
To get infected on Windows you... have to turn the system on. As far as I can tell.
Sure a lot of Windows infections are because the user downloaded and installed binaries from untrusted third parties, but equally as many just turned their computers on.
If you ran untrusted binaries on your Apple you'd be exposing yourself to similar risk. Hell, we used to have the same problem on IBM mainframes back in the '80's -- every year around chistmas time all the freshmen would run those greeting card programs in their in-boxes and bring the network down as the trojan spread itself to everyone in their address book. Windows just eliminates a lot of the work for you.
As the Linux userbase expands into increasingly less clueful segments of the population compromised systems are going to be more of a problem, but I predict that even if the installed Linux base ever grows to the size that Windowss is, the problem won't be as severe as it is on Windows. Unless everyone's running Lindows...
Re:If Microsoft did it, it would be Microsoft. (Score:2, Insightful)
This would hold true, imho, except that Mozilla encourages others to distribute these programs. As such, they give authorization for people to represent them. It's like going to a Quizzno's and buying a sandwhich, getting sick and then sueing the store (which has a placard of being independently owned) and the parent company. Yea the parent company didn't make a bad sandwhich, but guess what - they authorized this store to make them in their name.
Does it suck for the parent company, yes, but that is the chance they risk for letting others do their job.
Re:If Microsoft did it, it would be Microsoft. (Score:3, Insightful)
I guess this proves that Mozilla needs to take more care in selecting who is allowed to act as major redistributors. Maybe start releasing code hashes for every version of Mozilla offically released so that all can be verified before install?
No, it is not. (Score:3, Insightful)
The distribution system is how people get the code. If the md5sums from the main site would be valid, then why not download from the main site?
Once you start installing apps from random sites you open yourself up for all kinds of problems. Yeah. Keep believing that. Maybe you've heard of this stuff called "spyware" that infects machines via IE's ActiveX implementation.
Or maybe you haven't heard that a restricted user cannot use IE because the permissions aren't correct.
So, on Windows, you must have elevated permissions just to use the various apps and THAT is what results in so many infections.
Re:Infecting /bin? (Score:4, Insightful)
Last I checked all the major repository systems (rpm, apt, etc) require you to do so. Yup.
if you install software as root from a compromised source and don't check the md5sums
Checking the md5sums will do you absolutely no good unless you get the md5sum from a completely independant source -- which isn't true in most cases. In this case there was no independant source -- the Korean site compiles it and distributes it themselves and is not affiliated with the Mozilla foundation.
along with other precautions you put yourself at risk
My, that's nebulous. What precautions?
You could compile from source... and then you're safe as long as someone didn't trojan the CVS server (either intentionally or maliciously). Or are you going to evaluate every line of code prior to compiling it as well? Make sure to double check your compiler and libraries -- if they have a trojan injector then you'll have one hell of a time figuring that out.
No, it's not anything new. But it should be a wakeup call to a lot of people who think they're "safe" for running non-mainstream software. We're not -- we're just a smaller target. It's just a twist on "security through obscurity", and that's been proven to be inadequate countless times.
Re:If Microsoft did it, it would be Microsoft. (Score:3, Insightful)
Obviously it is not reasonable, but people here are not always reasonable, and they get mod'd -5 Reasonable, automatically, when MS is involved.
Well, since this thread and line of argument was started by "poor Microsoft! Can't get a fair shake on Slashdot! Look how bad Mozilla is!" whining, I think this statement is a tad disingenuous.
It's amazing to me, considering all the complaining pro-MS types do around here, just how well represented they are in these discussions.
Re:Secure.. (Score:3, Insightful)
But you'll have installed it as root, and the installer was infected, and you're still screwed.