Malware Attack Infected 25,000 Linux/UNIX Servers

from the sudo-configure-your-stuff-properly dept.
wiredmikey writes

20140322-150832.jpg

Security researchers from ESET have uncovered a widespread attack campaign that has infected more than 25,000 Linux and UNIX servers around the world. The servers are being hijacked by a backdoor Trojan as part of a campaign the researchers are calling ‘Operation Windigo.’ Once infected, victimized systems are leveraged to steal credentials, redirected web traffic to malicious sites and send as many as 35 million spam messages a day. ‘Windigo has been gathering strength, largely unnoticed by the security community, for more than two and a half years and currently has 10,000 servers under its control,’ said Pierre-Marc Bureau, security intelligence program manager at ESET, in a statement.

There are many misconceptions around Linux security, and attacks are not something only Windows users need to worry about. The main threats facing Linux systems aren’t zero-day vulnerabilities or malware, but things such as Trojanized applications, PHP backdoors, and malicious login attempts over SSH. ESET recommends webmasters and system administrators check their systems to see if they are compromised, and has published a detailed report presenting the findings and instructions on how to remove the malicious code if it is present.

Trust me: Big data is a huge security risk

Fear the Hadoop! It’ll expose your company data to unwashed hacker hordes! Luckily, this new big data security product fixes everything

By Andrew C. Oliver | InfoWorldFollow @acoliver

20140224-210524.jpg

When Hadoop started, it had a security problem. The spin from the various Hadoop vendors and proponents tended to be something like, “We see security as a front-end application issue.” This is what you say when you don’t have a good answer.

Since then, solutions like Apache Knox and Cloudera Manager have provided answers for authentication and authorization for basic database management functions. The underlying Hadoop Filesystem now incorporates Unix-like permissions.

This hasn’t completely quashed the issue, largely because of the way entrepreneurs think: If you can’t come up with a new idea, then plunk the S-word after the name of a new technology and you have a “BOLD IDEA FOR A NEW STARTUP!!!!” Rummage through the dustbin of recent history and you’ll find startups devoted to SOA security, AJAX security, open source security, and so on. Now we have big data security startups — and the money will roll right in! How do you launch a security startup? Scare people, of course.

The real security problem with Hadoop in particular and big data in general isn’t with everyday access rights — that took all of 10 minutes for the vendors and open source community to solve. The big problem is that when you aggregate a lot of data, you lose context. While I doubt many people are aggregating a lot of data without any context, aggregating any data means losing some context. A highly scalable architecture like Hadoop makes it feasible to store context, too, but checking all that context with each piece of data is an expensive proposition.

Here’s what you need to know about context: Though you learn all about authentication and authorization in any basic computer science course, the most important details are often skirted. Yes, you can get access to the database as a certain user, and yes, you can get access to the BankAccounts table, but which rows can you access? The more data you aggregate, the challenge of preserving granular rights and permissions grows.

How do you keep all of those data ownership and data context rules in place without killing the performance that caused you to choose a big data solution in the first place? Well, there are emerging technology solutions, such as Accumulo, created by the big data community — including everyone’s favorite member, the NSA.

Luckily, this has all been thought of before in research and in great detail. In fact, almost exactly one decade ago this was a hot topic. When you’re building your big data project that aggregates gobs of data from various places in the company and wondering about security, I suggest simply searching on “datawarehouse security.” Though 70 percent of the results will be vendor pitches or complaints about RBAC, you’ll find plenty of results that explain exactly how this was done before. Much of that previously published material describes neither technologies nor tools, but methodologies — and those more or less translate directly to big data.

Now, if you’ll excuse me, I have to work on my slide deck pitching a big data NoSQL cloud-based SaaS security solution, geared specially for Hadoop. VCs, call me!

This article, “Trust me: Big data is a huge security risk,” was originally published at InfoWorld.com. Keep up on the latest news in application development and read more of Andrew Oliver’s Strategic Developer blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.

Original article: http://www.infoworld.com/d/application-development/trust-me-big-data-huge-security-risk-236684

Who Is On My Wi-Fi?

http://www.whoisonmywifi.comimage

http://lifehacker.com/who-is-on-my-wi-fi-shows-you-who-else-is-using-your-net-1504773036?utm_campaign=socialflow_lifehacker_facebook&utm_source=lifehacker_facebook&utm_medium=socialflow

Appears to be a very useful tool, both at home and travel.  Article is worthy of a moment of attention.

More on RFID

Children have no choice.  Katherine discusses the San Antonio school district plan to give all students “the chip” so that they can be tracked throughout the day.  They are starting with the school with the lowest number of native English speakers.

Listen to her program by tapping on “the chip”

Passwords and New Jobs…

If you have a Facebook, Twitter, or any other social networking account, can you be asked for you account and its password?  Short answer, YES they can ask but you do not have to give it up…I imagine that depends upon how badly you need the job, also.  This does seem to be the big rave on the news, other than the Obama-Care challenge.

There is software that companies tend to use to sift through the internet to find out if anyone is talking bad about their company AND people have been fired for talking bad about the company that they worked for (note the operative term “worked”).  You have an obligation to not denigrate the company you work for and many of them have policies that reflect such a thing.  If you cross the line you should be held accountable…if only it were a perfect world where everyone was held to the same standard!  But anyway…

You have a right to privacy and there are certain lines that should not be crossed.  While on Facebook, I had posted the article “Should Companies be allowed to ask for your Facebook Password?” by Tuan C. Nguyen.  Someone answered with a comment essentially saying that if a company did ask for my password I could not work for them because they acting unethically (they want their passwords to be secure, but want yours?) and it would be a security violation of password sharing which is frowned upon in the IT community.  And he is definitely right…one of the first things you are taught is security & protection.

Until the next exciting adventure!

 

References:

http://www.smartplanet.com/blog/thinking-tech/should-companies-be-allowed-to-ask-for-your-facebook-password/10872?tag=nl.e660