Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: zeugma; miliantnutcase; NullPointerException; Utilizer; driftdiver

I just had a converstaion last night with a manager of a college computer science laboratory. he reports that their Linux and Apple systems were successfully attacked by the Cryptolocker ransomware. They restored their systems with backup images of the operating systems and with backups of the data files.

This Linux and Apple vulnerability to Cryptolocker is confirmed by search engine results, which include reports from a number of other college or university computer labs.

Some of these reports appear to claim Cryptolocker requires the user to open an infected file attachment in order to activated Cryptolocker. Such claims appear to be erroneous, because Cryptolocker seems to be infecting computers without the user having anything to do with e-mail and e-mail file attachments.


103 posted on 12/29/2013 5:47:32 AM PST by WhiskeyX ( provides a system for registering complaints about unfair broadcasters and the ability to request a)
[ Post Reply | Private Reply | To 83 | View Replies ]


To: WhiskeyX

Do they have file shares in common? I’ve read that it will seek out those from infected computers.


104 posted on 12/29/2013 5:57:46 AM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 103 | View Replies ]

To: WhiskeyX
This Linux and Apple vulnerability to Cryptolocker is confirmed by search engine results, which include reports from a number of other college or university computer labs.

Just did such a search and did not find this to be true. Also CERT claims systems affected are "Microsoft Windows systems running Windows 8, Windows 7, Vista, and XP operating systems."

106 posted on 12/29/2013 6:15:29 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 103 | View Replies ]

To: WhiskeyX

You cannot install software on a Linux box without entering the root password.


107 posted on 12/29/2013 6:18:35 AM PST by AppyPappy (Obama: What did I not know and when did I not know it?)
[ Post Reply | Private Reply | To 103 | View Replies ]

To: WhiskeyX

How does it infect without the user giving it sudo access?


108 posted on 12/29/2013 6:24:29 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 103 | View Replies ]

To: WhiskeyX
Best writup on Cryptolocker I've found is at BleepingComputer.
109 posted on 12/29/2013 6:29:30 AM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 103 | View Replies ]

To: WhiskeyX
...had a converstaion last night with a manager of a college computer science laboratory. he reports that their Linux and Apple systems were successfully attacked...

I would be quite curious to find out exactly what method was used to initiate the attack. Windows executables can NOT run on Linux or Apple machines. It does not matter if you rename them or not, with either a ".txt" extension or any other, or even with no extension at all as in Linux. The calls to the underlying OS are to dissimilar areas in the fundamental instructions necessary to run the computer.

The only way I can see that a successful or even partially succesful attack could be launched is by the useage of some manner of common second-party program calls, such as java, javascript, or flash files. At the very least, any computer that is allowed to run such files should be entirely separate from more critical machines, since the vulnerabilities in those types of files are well-established.

125 posted on 12/29/2013 9:38:52 AM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the mooslimbs trying to kill them-)
[ Post Reply | Private Reply | To 103 | View Replies ]

To: WhiskeyX
I just had a converstaion last night with a manager of a college computer science laboratory. he reports that their Linux and Apple systems were successfully attacked by the Cryptolocker ransomware.

I'll look into it, but if you keep your system reasonably up to date, I don't really see it as much of a threat. You have to purposefully make a file executable before you run it, (with Linux at least). I strongly suspect that most people who run Linux will be somewhat less susceptible to just randomly running software than your average Windows user.

 

127 posted on 12/29/2013 12:27:05 PM PST by zeugma (Is it evil of me to teach my bird to say "here kitty, kitty"?)
[ Post Reply | Private Reply | To 103 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson