Hidden under the hood - Linux backdoors

Sami Rautiainen F-Secure Corporation

During the past year there has been no global outbreaks of Linux worms or viruses, so for a bystander it might look as if life has been relatively easy for Linux users when it comes to malware.

However, the reality is something completely different. While we haven't seen automated attacks using worms, intrusions into Linux systems are anything but part of the past. Intruders often use semi-automated attacks to penetrate the system. A good sign that one's machine has been compromised is a presence of a backdoor - if it is ever detected.

Linux backdoors include sophisticated methods to hide themselves from the user of the machine, using anything from replaced system binaries to a kernel module.

This paper examines types of different backdoors for Linux, how they are hidden in the system and discusses different methods of detecting the presence of a backdoor.



twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.