Stealthy Linux rootkit found in the wild after going undetected for 2 years::Krasue infects telecom firms in Thailand using techniques for staying under the radar.

  • d3Xt3r@lemmy.nz
    link
    fedilink
    English
    arrow-up
    27
    arrow-down
    2
    ·
    1 year ago

    SELinux, grsecurity, containers, keep your system updated and don’t run random untrustworthy code.

    • TrickDacy@lemmy.world
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      1
      ·
      1 year ago

      random untrustworthy code.

      Honestly, is there much code in the world which doesn’t meet this description? How do you propose we decide what is trustworthy? Every time I update my packages I’m getting possibly millions of new lines of code that I can’t possibly personally vet

      • PlatinumSf@pawb.social
        link
        fedilink
        English
        arrow-up
        9
        ·
        1 year ago

        Keyword “Random”. The code for the packages that shipped for your os and for your user installed utilities are generally ‘trusted’ code since you sought out the install. It’s not bulletproof, but it’s a good start vs running any package that happens to land in your downloads folder.

        • TrickDacy@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          edit-2
          1 year ago

          Well, it’s not always so cut and dried. For example, do I need to research the maker of an app that looks useful? I don’t think most people on lemmy are the types to literally not care at all where software comes from, so I’m just trying to understand better how we can properly draw that line

      • pete_the_cat@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        Those packages are vetted by multiple maintainers from different places, they’d all have to be in on it.