First of all, it was posted on the first of April, Second, Torvalds stated that it is not really a linux virus at all, And, your post sounds like an add for anti-virus....... anything else? I did not have the patience to examine every one of those links, But since Torvalds doesn't seem too concerned, I ain't ether D
On Sun, Apr 3, 2011 at 10:59 PM, [email protected] < [email protected]> wrote: > > > > > On 04/03/2011 11:20 AM, chas kennison wrote: > > > > ok, so was it an april fools joke or is it valid? > > > > -- > > > > Are you serious ! Read the sources ! I do not engage in 'april fools' > jokes. Myself as source, on Windows, I perform malware removal help and > amatuer forensics, free lance IT Security. ... http://bluecollarpc.us/ > since 2005. > > This is the original message... > http://tech.groups.yahoo.com/group/LINUX_Newbies/message/29350 > > What part exactly makes you think this is a joke ? Sources of the > statement/information: > > antivirus.about.com ? > networkcomputing.com ? > darknet.org.uk ? > computerworld.com ? > pcworld.com ? > > You asked .... (I don't understand why, or you are just teasing ? The > post is quite self explanatory, why do you ask ?)... > > New virus infects Linux and Windows platforms (cross-platform > infections)..... > > Winux Virus > New virus infects Linux and Windows platforms*: security technology > studies microsoft windows versions linux viruses malicious payload > william stearns.... > http://antivirus.about.com/library/weekly/aa032801a.htm > > Winux: Two in One Virus > The first Windows, Linux cross-platform virus discovered > http://antivirus.about.com/library/weekly/aa032801a.htm > "Virus researchers have discovered a new breed of virus that infects > both Windows and Linux files on Intel-based Pentium PC's. Considered a > proof-of-concept virus, it has not been found in-the-wild. As such, it > is not posing a threat to users, but could signal the beginning of a new > precedent in virus writing - the cross-platform threat. Within less than > a day of discovery, the new virus has already been assigned a number of > different names, including Linux.PEElf.2132, W32.Winux, Linux.Winux, > W32/Lindose, and W32.PEElf.2132. ..... > > HISTORY..... > Cross-platform Virus Infects Linux And Windows > > http://www.networkcomputing.com/data-protection/cross-platform-virus-infects-linux-and-windows.php > > April 7, 2006 > A Russian security company announced Friday that it had found a > cross-over virus that can infect PCs running either the open-source > Linux or Microsoft Windows operating systems. Dubbed "Linux.Bi.a" and > "Win32.Bi.a," the split-personality malware doesn't do any damage. > Instead, said Moscow-based Kaspersky Labs in an online briefing, it's a > proof-of-concept to prove that a cross-platform virus is possible. > > Java Based Cross Platform Malware Trojan (Mac/Linux/Windows) > > http://www.darknet.org.uk/2011/01/java-based-cross-platform-malware-trojan-maclinuxwindows/ > > 20 January 2011 > It's pretty rare to read about malware on the Linux or Mac OSX > platforms and even more rare to read about cross-platform malware which > targets both AND Windows by using Java. A neat piece of coding indeed, > it targets vulnerabilities in all 3 operating systems -- the sad thing? > The malware itself is vulnerable to a basic directory traversal exploit, > which means rival gangs can actually commandeer the infected targets. > They went to lengths to keep it secure and unseen (encrypted > communications etc) -- but didn't program the malware itself securely... > > Computerworld - > > http://www.computerworld.com/s/article/110330/Kaspersky_warns_of_cross_platform_virus_proof_of_concept > *Kaspersky Labs is reporting a new proof-of-concept virus capable of > infecting both Windows and Linux systems. > The cross-platform virus is relatively simple and appears to have a low > impact, according to Kaspersky. Even so, it could be a sign that virus > writers are beginning to research ways of writing new code capable of > infecting multiple platforms, said Shane Coursen, senior technical > consultant at Kaspersky. > > RELATED: > Torvalds Patches Linux Kernel, Fixes Broken Virus - > > http://www.pcworld.com/article/125461/torvalds_patches_linux_kernel_fixes_broken_virus.html > PCWorld > After discovering that the virus didn't work on recent versions of > Linux, ... > "We may see another virus using the same method of cross-platform > infection. ... " > > Linux malware From Wikipedia, the free encyclopedia > http://en.wikipedia.org/wiki/Linux_malware > A new area of concern identified in 2007 is that of cross-platform... > was discovered that contained a script that used the infected Linux PC > in denial-of- service attacks. ... There are a number of anti-virus > applications available for Linu*, .... Windows Viruses". > > FROM OUR BLOG ON THIS...... > My Linux choice -- Ubuntu (dual boot systems, security myth already) > August 15, 2010 --- bluecollarpc > > https://bluecollarpcwebs.wordpress.com/2010/08/15/my-linux-choice-ubuntu-dual-boot-systems-security-myth-already/ > "....Of course as webmaster of the BlueCollarPC since 2005, I am > obviously very, very, very security oriented and share this as a > Community Help site -- free (Windows OS). We can review original 'horn > locking' from mid-decade (2000 -- 2010) in the several arguments that > Firefox browser, Linux OS (operating system) , Apple/Mac were safer than > Windows between the two operating system users and conclude that in this > new decade Windows users may begin to flock to Linux as a "back up > system" to Windows being inoperative due to malwares. This is along the > lines that much malware on Windows used the Active X maliciously (like > trojans or malware toolbars, etc.) in Internet Explorer browser and the > Mozilla Firefox browser operated without it. So the arguements began and > the hype and so on that "Firefox is safer than Internet Explorer" and > many, many Windows users have installed Firefox as a back up browser to > use in the event malware affecting the Internet Explorer in some lock > out denial of service manner occurred. In the early days this was > working to achieve logging onto the internet when you could not on IE > (Microsoft Internet Explorer, part of Windows OS). But cybercrime has > evolved greatly in a very, very, very short time and with today's botnet > activities and infections -- they can simply block many browsers from > navigating to security sites for removal help and software and > utilities. There was also a cross-infection that was achieved between > the two browsers -- Firefox and IE. > > So, although this may be true in the Linux add on as a back up system > right in the same computer (dual boot) with Windows - along those same > lines as the 'back up browser' -- cyber crime no doubt has and is > working on some "cross platform" type infection ability -- cross > operating system malware -- to rule this out, meaning as fast as we get > there with this idea -- they have already seen us coming. Suddenly just > a couple years ago, all the Linux and Apple/Mac malwares were discovered > and do not forget the other argument -- Linux and Apple/Mac were safer > simply because 90 percent of the world was on Windows and are the target > of the cyber criminal underground meaning Windows users are "where the > money is". This is relating to the malicious ID Theft activity by cyber > criminals and other various spyware scenarios and nefarioius use. > In this new decade (2010 -- 2020) - I obviously predict this occurrence > of the cross operating system infection for dual boot observing this -- > user security options as adding another OS creating a dual boot system > computer. It will be exploding with all the ways in a dual boot system > using Linux and Windows of how you can use Linux to actually hack back > into the infected Windows sytem to get rid of malware infection. This is > already possible in various ways. Not long and it is going to be the > same with just Windows as with dual boot systems -- in worst infections > there will be no way in to remove it. ....." > > ESET NOD32 has won the most awards for Windows protection... > (about 25 percent more than second and third place worldwide - Symantec, > Sophos) > ESET NOD32 Currently 59 VB100 awards ! > http://www.eset.com/ > http://en.wikipedia.org/wiki/ESET_NOD32 > This brings the ESET Antivirus VB100 award total to 59 - still > the highest of any antivirus vendor! > December 2009 - ESET antivirus scoops 59th VB100 Award > > http://www.betterantivirus.com/nod32-and-virus-news/archives/1456-December-2009-ESET-antivirus-scoops-59th-VB100-Award.html > ....So you figure if you absolutely need/want protection - they are a > superb company.... > ESET NOD32 Antivirus 4 for Linux Desktop Beta Program > Whether you use your Linux desktop to surf the Web or work on shared > office documents, it is vulnerable to direct attacks by malware or may > be targeted as a carrier for cross-platform viruses and other threats > designed to target Windows and Macs. Network shares, email and removable > media like USB keys are easy ways for multiplatform malware to spread > under the radar. > Runs on the following distributions: Debian, Fedora, Mandriva, RedHat, > SuSE, Ubuntu, and other RPM and DEB package manager based installations. > kernel >= 2.6 > GNU C Library 2.3 or newer > GTK+ 2.6 or newer > LSB 3.1 compatibility recommended > THE MORE LINUX IS USED, THE MORE THE NEED AND REALIZATION OF COMBO > PACKAGES FROM SECURITY PRODUCTS NO DOUBT* ! > Research Item: > Executable and Linkable Format > From Wikipedia, the free encyclopedia > http://en.wikipedia.org/wiki/Executable_and_Linkable_Format > I personally have been hedgy about dual boot (Linux and Windows on same > computer) and have mine (Ubuntu Linux) on my Windows Vista machine of > the which Vista is noteably the safest Windows operating system EVER > conceived that does not allow viruses to "write to the computer disk" > and any virus can only achieve residing temporarily in the tempfiles > which would need stupidity or being duped to click and execute the > infection. As well with UAC (User Account Control) on as recommended > that does this protection -there is NO rootkit that can possibly run on > Vista EVER found. .... > Vista's Despised UAC Nails Rootkits, Tests Find - Business Center ... > > http://www.pcworld.com/businesscenter/article/146256/vistas_despised_uac_nails_rootkits_tests_find.html > > May 25, 2008 ... Most users find it annoying, but Vista's Account Control > feature proves most effective in security tests..... > QUOTED.... > "....Love or hate its nagging prompts, Vista's Account Control feature > (UAC) has a security feature that marks it out from any other type of > Windows security programme -- it can spot rootkits before they install. > This is one finding buried in a report published in two German computer > magazines some months ago after testing by the respected AV-Test.org > <http://www.pcworld.com/article/id,136206/article.html?tk=rel_news>, > which set out to find out how well antivirus programs > <http://www.pcworld.com/browse/1228/topic.html?page=1&typeId=3?tk=rel_news> > > fared > against known rootkits. > > The answer was not particularly well at all, either for Windows XP, or > Vista-oriented products. Of 30 rootkits thrown at XP anti-malware > scanners, none of the seven AV suites found all 30, a similar story to > the six web-based scanners assessed. Only four of the 14 specialized > anti-rootkit tools managed a perfect score. > > Best Protection > > The best of the all-purpose suites was Avira AntiVir Premium Security > Suite, which found 29 active rootkits, with Norton finding as few as 18. > The anti-rootkit tools fared better, with AVG Anti-Rootkit Free, GMER, > Rootkit Unhooker LE, and Trend Micro Rootkit Buster achieving perfect > scores. The scores for removal were patchy, however, with all failing to > remove any of the rootkits they had found. > > The results for Vista products were harder to assess because only six > rootkits could run on the OS, but the testers had to turn off UAC to get > even this far. **Vista's UAC itself **spotted everything thrown in front > of it. > > Only three of the 17 AV tools for Vista managed to both detect and > successfully remove them, F-Secure Anti-Virus 2008, Panda Security > Antivirus 2008, and Norton Antivirus 2008.* > > Once on a PC, rootkits can bury themselves quietly, but they have to get > to that point first. As long as users interpret prompts from the UAC > system attentively, or those messages haven't in some way been spoofed, > rootkits struggle to jump to the PC without drawing attention to > themselves. > > That UAC can tell a user when a rootkit is trying to install itself is > not in itself surprising, as Vista is supposedly engineered from the > ground up to intercept all applications requests of any significance. > > [Non-text portions of this message have been removed] > > > [Non-text portions of this message have been removed] ------------------------------------ To unsubscribe from this list, please email [email protected] & you will be removed.Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/LINUX_Newbies/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/LINUX_Newbies/join (Yahoo! ID required) <*> To change settings via email: [email protected] [email protected] <*> To unsubscribe from this group, send an email to: [email protected] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
