<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>rootkit Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/rootkit/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 24 Oct 2018 08:07:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Tiger – Rootkit Checker for Linux</title>
		<link>https://www.osradar.com/tiger-rootkit-checker-for-linux/</link>
					<comments>https://www.osradar.com/tiger-rootkit-checker-for-linux/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Wed, 24 Oct 2018 08:07:21 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[linux malware]]></category>
		<category><![CDATA[linux rootkit]]></category>
		<category><![CDATA[linux virus]]></category>
		<category><![CDATA[rootkit]]></category>
		<category><![CDATA[rootkit linux]]></category>
		<category><![CDATA[virus on linux]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=6701</guid>

					<description><![CDATA[<p>There’s a really popular myth going all around that Linux is not vulnerable to the virus. The claim is true to a certain extent. Obviously, Linux has a fewer enemy than the so-popular Windows OS. There’s no system in the world that’s not prone to malware attacks. Rootkits are one of the nastiest malware that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/tiger-rootkit-checker-for-linux/">Tiger – Rootkit Checker for Linux</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There’s a really popular myth going all around that Linux is not vulnerable to the virus. The claim is true to a certain extent. Obviously, Linux has a fewer enemy than the so-popular Windows OS. There’s no system in the world that’s not prone to malware attacks.</p>
<p>Rootkits are one of the nastiest malware that hides in the system without any detection and gains unauthorized access over the system to perform a wide range of illegal acts. Good computer usage habit should be enough to protect you against most of the threats. However, if you suspect that your computer is under the control of a rootkit, it’s time to finish it.</p>
<p>Let’s get started with Tiger rootkit scanner.</p>
<h1>Installing Tiger</h1>
<p>Tiger isn’t a part of the default Linux packages. Run the following command(s) according to your own Linux distro.</p>
<ul>
<li>Ubuntu</li>
</ul>
<pre class="">sudo apt install tiger</pre>
<p><img loading="lazy" class="size-full wp-image-6703 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/10/tiger-1.png" alt="" width="1066" height="534" srcset="https://www.osradar.com/wp-content/uploads/2018/10/tiger-1.png 1066w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-1-300x150.png 300w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-1-768x385.png 768w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-1-1024x513.png 1024w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-1-696x349.png 696w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-1-838x420.png 838w" sizes="(max-width: 1066px) 100vw, 1066px" /></p>
<ul>
<li>Debian</li>
</ul>
<pre class="">sudo apt-get install tiger</pre>
<ul>
<li>Arch Linux</li>
</ul>
<pre class="">sudo pacman -S git base-devel
git clone https://aur.archlinux.org/tiger.git

cd tiger
makepkg -sri</pre>
<ul>
<li>Generic Linux instruction</li>
</ul>
<p>Grab Tiger –</p>
<pre class="">git clone https://git.savannah.nongnu.org/git/tiger.git</pre>
<p><img loading="lazy" class="size-full wp-image-6704 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/10/tiger-2.png" alt="" width="1060" height="239" srcset="https://www.osradar.com/wp-content/uploads/2018/10/tiger-2.png 1060w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-2-300x68.png 300w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-2-768x173.png 768w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-2-1024x231.png 1024w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-2-696x157.png 696w" sizes="(max-width: 1060px) 100vw, 1060px" /></p>
<p>Install Tiger –</p>
<pre class="">cd tiger/
sudo ./install.sh</pre>
<h1>Checking for rootkits</h1>
<p>Tiger doesn’t offer much customizability, for example, running the “rootkit scan” only. It will perform all of its tasks on the whole system.</p>
<p>Run Tiger –</p>
<pre class="">sudo tiger</pre>
<p><img loading="lazy" class="size-full wp-image-6705 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/10/tiger-3.png" alt="" width="1060" height="738" srcset="https://www.osradar.com/wp-content/uploads/2018/10/tiger-3.png 1060w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-3-300x209.png 300w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-3-768x535.png 768w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-3-1024x713.png 1024w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-3-100x70.png 100w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-3-696x485.png 696w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-3-603x420.png 603w" sizes="(max-width: 1060px) 100vw, 1060px" /></p>
<p>Once the process is complete, it will show the report log location.</p>
<h1>Reviewing the Tiger report</h1>
<p>Review the Tiger report –</p>
<pre class="">sudo -s
cat /var/log/tiger/security.report.xxx.xxx-xx:xx</pre>
<h1><img loading="lazy" class="size-full wp-image-6706 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/10/tiger-4.png" alt="" width="1059" height="233" srcset="https://www.osradar.com/wp-content/uploads/2018/10/tiger-4.png 1059w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-4-300x66.png 300w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-4-768x169.png 768w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-4-1024x225.png 1024w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-4-696x153.png 696w" sizes="(max-width: 1059px) 100vw, 1059px" /> <img loading="lazy" class="size-full wp-image-6707 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/10/tiger-5.png" alt="" width="1060" height="738" srcset="https://www.osradar.com/wp-content/uploads/2018/10/tiger-5.png 1060w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-5-300x209.png 300w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-5-768x535.png 768w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-5-1024x713.png 1024w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-5-100x70.png 100w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-5-696x485.png 696w, https://www.osradar.com/wp-content/uploads/2018/10/tiger-5-603x420.png 603w" sizes="(max-width: 1060px) 100vw, 1060px" /></h1>
<h1>What to do if any rootkit found</h1>
<p>The report will notify you where the rootkit is present. Depending on the condition, you should perform a clean re-install of your system. This will allow you to have a clear system without any rootkits. Learn more about installing <a href="https://www.osradar.com/install-ubuntu-mate-18-04/">Ubuntu MATE</a> or <a href="https://www.osradar.com/how-to-install-ubuntu-18-04-lts/">Ubuntu</a>.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/tiger-rootkit-checker-for-linux/">Tiger – Rootkit Checker for Linux</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/tiger-rootkit-checker-for-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LoJax – First UEFI Rootkit in the Wild</title>
		<link>https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/</link>
					<comments>https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 09:58:54 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[bios]]></category>
		<category><![CDATA[bios rootkit]]></category>
		<category><![CDATA[rootkit]]></category>
		<category><![CDATA[uefi]]></category>
		<category><![CDATA[uefi firmware]]></category>
		<category><![CDATA[uefi malware]]></category>
		<category><![CDATA[uefi rootkit]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=6100</guid>

					<description><![CDATA[<p>A group of security researchers tracking the operations of a cyber-espionage group discovered a new rootkit that works on UEFI (Unified Extensible Firmware Interface) and currently in operation in the wild. According to ESET, this threat actor integrated the rootkit in the SPI flash module on the target computer. This allows the rootkit persistence over [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/">LoJax – First UEFI Rootkit in the Wild</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A group of security researchers tracking the operations of a cyber-espionage group discovered a new rootkit that works on UEFI (Unified Extensible Firmware Interface) and currently in operation in the wild.</p>
<p>According to ESET, this threat actor integrated the rootkit in the SPI flash module on the target computer. This allows the rootkit persistence over the system even if components like the OS and/or hard drive are replaced. That’s a very powerful ability and dangerous.</p>
<p>The security researchers gave the rootkit a nice name – LoJax. The name came from the malicious samples of the LoJack anti-theft software.</p>
<h1>Signed drivers for accessing the firmware</h1>
<p><img loading="lazy" class="size-full wp-image-6101 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/09/trusted.jpg" alt="" width="800" height="550" srcset="https://www.osradar.com/wp-content/uploads/2018/09/trusted.jpg 800w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-300x206.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-768x528.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-100x70.jpg 100w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-218x150.jpg 218w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-696x479.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/09/trusted-611x420.jpg 611w" sizes="(max-width: 800px) 100vw, 800px" /></p>
<p>According to the security researchers, there were 3 different types of tools on the victim’s computers where 2 of them gathers the details about the system firmware and creates a copy of the system firmware by reading the SPI flash memory module.</p>
<p>The last one then injects the malicious module inside the gathered firmware copy. Then, the modified copy is flashed to the SPI flash memory. Thus, ultimate persistency for the malware.</p>
<p>For reaching the UEFI settings, all the tools present in the rootkit uses the kernel driver of the <a href="http://rweverything.com/">RWEverything</a> – a tool giving the power to modify all the settings and firmware of almost ALL the hardware. The driver comes up with a valid certificate and that’s the catch.</p>
<p>According to ESET, the patching tool uses various techniques for abusing the misconfiguration of the system or even bypass the SPI flash memory write protections. If the write operations are denied from the system, then the rootkit exploits a 4-years old race condition vulnerability in UEFI (CVE-2014-8273) for bypassing this defense.</p>
<p>The ultimate target of the rootkit is just dropping the malware into the Windows system and making sure that it integrates in the OS every time the system boots.</p>
<h1>Defense against LoJax</h1>
<p><img loading="lazy" class=" wp-image-6102 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/09/defense-against-lojax.jpg" alt="" width="705" height="470" srcset="https://www.osradar.com/wp-content/uploads/2018/09/defense-against-lojax.jpg 630w, https://www.osradar.com/wp-content/uploads/2018/09/defense-against-lojax-300x200.jpg 300w" sizes="(max-width: 705px) 100vw, 705px" /></p>
<p>Despite using advanced methods, LoJax is easily defendable with the currently available methods. First of all, make sure that you enable “Secure Boot” mechanism. This ensures that everything that’s loaded in the system firmware comes up with a valid certificate. LoJax isn’t signed, so it won’t be able to load due to “Secure Boot”.</p>
<p>Another very crucial thing is to make sure that your motherboard has the latest version of firmware. For upgrading your motherboard firmware, check out the official website of your motherboard vendor. After upgrading to the latest version, the firmware should fix and tighten the protection for the SPI flash memory module.</p>
<p>If your system has the latest firmware, you can reflash the firmware. It involves downloading the latest firmware package from motherboard vendor’s website and applying it again. Different motherboard vendors provide different ways of reflashing/updating the firmware.</p>
<p>LoJax is a threat for high-value targets, so general users shouldn’t be afraid of it just yet. Make sure that you take the necessary steps to tighten your system security and you’re good to go!</p>
<p>Cheers!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/">LoJax – First UEFI Rootkit in the Wild</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/lojax-first-uefi-rootkit-in-the-wild/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
