Skip to content

Commit b1b2203

Browse files
authored
Update linux-rootkit-realcase.md
1 parent de30881 commit b1b2203

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

random/linux-rootkit-realcase.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ So what was my ultimate mistake? I did open a QEMU instance from `virt-manager`
1414

1515
Right now, someone could say: YOUR FAULT! Yes, it is. Or drop the network (physically), and do some RAM/memory analysis, stay calm. Correct answer, maybe. I trusted my hardened 5.5 year old Arch Linux system too much, so I didn't expect this to be possible in the first place. So, I ignored some recovery principles some experts suggest to a situation like this, and rebooted my system.
1616

17-
After the reboot, I opened a new TTY (shell/CLI). Even before logging in, I found out that something fancy was going on. Whitepace characters, appearing from nowhere at regular 1 second intervals, automatically being printed on /dev/stdout (STDOUT):
17+
After the reboot, I opened a new TTY (shell/CLI). Even before logging in, I found out that something fancy was going on. Whitepace characters, appearing from nowhere at regular 1 second intervals, automatically being printed on `/dev/stdout` (STDOUT):
1818

1919
![](../images/linux_hypervisor_rootkit.png)
2020
_Well, this is something new I have never seen in the last 9 years. You definitely don't want this running on your company's production or server systems, do you?_
@@ -47,7 +47,7 @@ I understand several basic facts here:
4747

4848
### Conclusions
4949

50-
This was something that taught me security in a real hard way. Before that, all Metasploit stuff...well, this is something new. I doubt the main target of this attack is some data centers or other places where QEMU is being used. Just think about it: let your users run their malicious shit on a virtual machines, and using misconfigured hypervisor `libvirtd`, the hypervisor itself can become infected. And the user still happily continues using his/her virtual machine instance, never knowing about the threat. Instead, it is sysadmin's problem now. You definitely want to find this threat but you don't want to be that sysadmin who explains to management or boss how this situation was possible in the first place.
50+
This was something that taught me security in a real hard way. Before that, all Metasploit stuff...well, this is something new. I doubt the main target of this attack is some data centers or other places where QEMU is being used. Just think about it: let your users run their malicious shit on virtual machines, and using misconfigured hypervisor process `libvirtd`, the hypervisor itself can become infected. And the user still happily continues using his/her virtual machine instance, never knowing about the threat. Instead, it is sysadmin's problem now. You definitely want to find this threat but you don't want to be that sysadmin who explains to management or boss how this situation was possible in the first place.
5151

5252
### Again: basics of security
5353

0 commit comments

Comments
 (0)