Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
GNU is Not Unix Operating Systems Worms IT Linux

Ask Slashdot: Is GNU/Linux Malware a Real Threat? 252

New submitter m.alessandrini writes "I've been using Debian for a long time, and I'm not a novice at all; I install system updates almost daily, I avoid risky behaviors on Internet, and like all Linux users I always felt safe. Yesterday my webcam suddenly turned on, and turned off after several minutes. I'm pretty sure it was nothing serious, but I started thinking about malware. At work I use noscript and other tools, but at home I have a more relaxed browser to be used by other family members, too. Here I'm not talking about rootkits or privilege escalation (I trust Debian), I think more of normal user compromise. For example, these days much malware come from malicious scripts in sites, even in advertising banners inside trusted sites, and this is more 'cross-platform' than normal viruses. So, what about non-root user malware? How much could this be real? And how can you diagnose it?"
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Is GNU/Linux Malware a Real Threat?

Comments Filter:
  • by Anonymous Coward on Thursday May 30, 2013 @04:45PM (#43865453)

    Your webcam turned on, then off, and you didn't ask it to? I think you need to figure out what happened first.

  • Don't worry (Score:5, Insightful)

    by Black Parrot ( 19622 ) on Thursday May 30, 2013 @04:46PM (#43865487)

    It was just Skynet checking out what you were up to. Or maybe the ATF. Or Russian Mafia. Or...

    As for security, ~5 years ago read someone's account of watching while someone on the internet installed a root kit on his Linux box in a matter of minutes.

    Presumably some platforms/applications are less likely to be compromised than others, but the safest assumption is that everything is compromised, or would be if the experts wanted it.

  • by Anonymous Coward on Thursday May 30, 2013 @04:53PM (#43865605)

    Do not copy and paste commands into your terminal that you do not understand.

    The vast majority of compromised Linux systems that I've dealt with have not been because of any malware or crazy hacking, they've been because people copied and pasted commands that gave attackers free access to their computer. I've seen fairly computer literate people open their systems right up because they had a bug, searched Google, and entered the first command they saw into their terminal.

    Don't do it. Don't let your parents, friends, or whoever relies on you for tech support think that this is okay behavior. It's just as bad as launching random exe's in Windows.

  • Yes (Score:5, Insightful)

    by Anonymous Coward on Thursday May 30, 2013 @04:58PM (#43865673)

    As long as you have people on Ubuntu forums posting "sudo apt-get " as the solution to everything without explaining what they do, and as long as you have people willing to copy/paste the commands without understanding what they are doing, then malware is a threat.

    The same groupthink plagues the Arch Linux forums. Blindly copy/pasting commands that someone else put on a wiki does not make you elite, it makes you an idiot.

    The same issue exists in adding repositories from untrusted sources. What's the point of running an enterprise-class operating system if the first thing you do is add a third party repo from Russia and update the kernel with something ending -kmod?

    The critical mass of idiot users still reside in Windows, where things like UAC and walled gardens exist to protect them somewhat. At least there, you have to know the administrator password to do real damage. Ubuntu and all the new user-friendly distros are content to put every new account in /etc/sudoers and allow you to use your own password to gain root access. Any operating system is prone to malware so long as people are willing to bend security practices.

  • by Nutria ( 679911 ) on Thursday May 30, 2013 @05:01PM (#43865713)

    Linux is much easier to exploit than Windows. All of its internals are well understood, and there are more things one can do with shell access.

    2003 is calling. They want their FUD back.

  • by 0racle ( 667029 ) on Thursday May 30, 2013 @05:02PM (#43865731)
    You know it was more likely a misbehaving application polling the webcam and not anything nefarious right? As another poster said, Flash is probably a leading culprit.
  • by mlts ( 1038732 ) * on Thursday May 30, 2013 @06:17PM (#43866721)

    That is what SELinux and AppArmor are for. They might not be 100% (as there were some kernel exploits that could be used to bypass those), but with proper policies in place, something getting UID 0 would be pretty limited in what it can accomplish.

    OS X also has a similar mechanism in place.

    Linux also has a bunch of different distributions. A bug that causes SSL keys to be very weak in Ubuntu is not going to affect RedHat systems.

    This doesn't mean Linux is worry-free, but it is more secure than people think. To cite an anecdotal example, the proof is in the pudding -- look at all the amateurish Apache servers and LAMP stacks out there. If Linux had major issues in general, there would be major screaming on almost every forum how insecure the OS is.

  • by Anonymous Coward on Thursday May 30, 2013 @06:49PM (#43867035)

    1% of 10% is smaller than .7% of 90%.

    Yes, it is. But if you discuss infection risk for users and infectability of a platform, percentage of user base is the right measure.

  • Comment removed (Score:4, Insightful)

    by account_deleted ( 4530225 ) on Thursday May 30, 2013 @07:36PM (#43867395)
    Comment removed based on user account deletion

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...