0nekoneko7@lemmy.world to Linux@lemmy.mlEnglish · 5 months agoKaspersky releases free tool that scans Linux for known threatswww.bleepingcomputer.comexternal-linkmessage-square85fedilinkarrow-up1106arrow-down163
arrow-up143arrow-down1external-linkKaspersky releases free tool that scans Linux for known threatswww.bleepingcomputer.com0nekoneko7@lemmy.world to Linux@lemmy.mlEnglish · 5 months agomessage-square85fedilink
minus-squareboredsquirrel@slrpnk.netlinkfedilinkarrow-up24arrow-down4·5 months agoI HIGHLY doubt that they would detect the XZ backdoor
minus-squarefar_university1990@feddit.delinkfedilinkarrow-up2·5 months agoBöhmermann in freier Wildbahn gesichtet
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up4·edit-25 months agoEven if it did, what would you do? rm -rf /? XZ is part of the core system
minus-squareatzanteol@sh.itjust.workslinkfedilinkEnglisharrow-up4arrow-down1·5 months agoWhy? It’s not hard. They typically hash files and look for hits against a database of known vulnerabilities.
minus-squareboredsquirrel@slrpnk.netlinkfedilinkarrow-up7·5 months agoYes and if viruses use something like base64 encoding or other methods, the hashes dont match anymore. As far as I understood it, it is pretty easy to make your virus permanently un-hashable by just always changing some bits
minus-squareatzanteol@sh.itjust.workslinkfedilinkEnglisharrow-up2·5 months agoThe xz backdoor was a packaged file distributed with the standard packages though. It would be trivial to find.
minus-squareboredsquirrel@slrpnk.netlinkfedilinkarrow-up1·5 months agoThis is obviously not about this known file. It is about “would this scanner detect a system package from the official repos opening an ssh connection”
minus-squareatzanteol@sh.itjust.workslinkfedilinkEnglisharrow-up1·5 months agoSorry, I was responding to: I HIGHLY doubt that they would detect the XZ backdoor
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up2·edit-25 months agoThat doesn’t work against polymorphic malware I think the best way is to monitor calls and behavior. Doing that is a privacy nightmare
minus-squareatzanteol@sh.itjust.workslinkfedilinkEnglisharrow-up1·5 months agoWho’s talking about polymorphic malware? We were talking about the xz backdoor.
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up1·5 months agoOh well in that case there is no chance
I HIGHLY doubt that they would detect the XZ backdoor
Böhmermann in freier Wildbahn gesichtet
War auch überrascht
Even if it did, what would you do? rm -rf /?
XZ is part of the core system
Why? It’s not hard. They typically hash files and look for hits against a database of known vulnerabilities.
Yes and if viruses use something like base64 encoding or other methods, the hashes dont match anymore.
As far as I understood it, it is pretty easy to make your virus permanently un-hashable by just always changing some bits
The xz backdoor was a packaged file distributed with the standard packages though. It would be trivial to find.
This is obviously not about this known file.
It is about “would this scanner detect a system package from the official repos opening an ssh connection”
Sorry, I was responding to:
That doesn’t work against polymorphic malware
I think the best way is to monitor calls and behavior. Doing that is a privacy nightmare
Who’s talking about polymorphic malware? We were talking about the xz backdoor.
Oh well in that case there is no chance