Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things.
That is one of the findings in a report WatchGuard Technologies, a maker of network security appliances, released last week.
The report, which analyzes data gathered from more than 26,000 appliances worldwide, found three Linux malware programs in the top 10 for the first quarter of the year, compared with only one during the previous period.
"Linux attacks and malware are on the rise," wrote WatchGuard CTO Corey Nachreiner and Security Threat Analyst Marc Laliberte, coauthors of the report. "We believe this is because systemic weaknesses in IoT devices, paired with their rapid growth, are steering botnet authors towards the Linux platform."
However, "blocking inbound Telnet and SSH, along with using complex administrative passwords, can prevent the vast majority of potential attacks," they suggested.
New Avenue for Hackers
Linux malware began growing at the end of last year with the Mirai botnet, observed Laliberte. Mirai made a splash in September when it was used to attack part of the Internet's infrastructure and knock millions of users offline.
"Now, with IoT devices skyrocketing, a whole new avenue is opening up to attackers," he told LinuxInsider. "It's our belief that the rise we're seeing in Linux malware is going hand in hand with that new target on the Internet."
Makers of IoT devices haven't been showing whiteboard explainer video, Laliberte continued. Their goals are to make their devices work, make them cheap, and make them quickly.
"They really don't care about security during the development process," he said.
Trivial Pursuits
Most IoT manufacturers use stripped down versions of Linux because the operating system requires minimal system resources to operate, said Paul Fletcher, cybersecurity evangelist at Alert Logic.
"When you combine that with the large quantity of IoT devices being connected to the Internet, that equals a large volume of Linux systems online and available for attack," he told LinuxInsider.
In their desire to make their devices easy to use, manufacturers use protocols that are also user-friendly for hackers.
"Attackers can gain access to these vulnerable interfaces, then upload and execute the malicious code of their choice," Fletcher said.
Manufacturers frequently have poor default settings for their devices, he pointed out.
"Often, admin accounts have blank passwords or easy-to-guess default passwords, such as 'password123,'" Fletcher said.
The security problems often are "nothing Linux-specific per se," said Johannes B. Ullrich, chief research officer at the SANS Institute.
"The manufacturer is careless on how they configured the device, so they make it trivial to exploit these devices," he told LinuxInsider.
The post IoT Fuels Growth of Linux Malware appeared first on Baltimore Tech.
from http://baltimoretech.org/news/iot-fuels-growth-of-linux-malware/
No comments:
Post a Comment