On Tue, 4 May 2021 10:00:25 -0700, Rick wrote in message 
<20210504170025.gb18...@linuxmafia.com>:

> Quoting Arnt Karlsen (a...@iaksess.no):
> 
> > On Fri, 30 Apr 2021 14:37:20 +0200, Arnt wrote in message 
> > <20210430143720.7311bc82@d44>:
> > 
> >   
> > > https://www.theregister.com/2021/04/29/stealthy_linux_backdoor_malware_spotted/
> > >    
> > 
> > ..how it works:
> > https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/  
> 
> Answer:  Avoid installing and running it.
> 
> This isn't any kind of intrusion tool, just yet another backdoor
> program that can be installed and activated after intrusion through
> other means entirely -- indistinguishable except in fine detail from
> countless others that have existed for decades.  And _TheReg_ was
> very clear about that:
> 
>   The malware is not an exploit; rather it's a payload that opens a
>   backdoor on the targeted machine. It might be installed by an
>   unsuspecting user, an intruder, or through a dropper Trojan. How
>   RotaJakiro has been distributed remains unanswered.
> 
> So, there ya go:  Avoid installing and running it.  It's called system
> administration.

..very true.  Are there ways to trick common Devuan installs 
into automatically installing these bad things?  
(Other than tricking newbie etc users, sysadmins etc into 
doing it?)


-- 
..med vennlig hilsen = with Kind Regards from Arnt Karlsen
...with a number of polar bear hunters in his ancestry...
  Scenarios always come in sets of three: 
  best case, worst case, and just in case.
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to