Announcement

Collapse
No announcement yet.

[Closed] Phalanx2 rootkit possibly targeting 2.6.x kernels

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    [Closed] Phalanx2 rootkit possibly targeting 2.6.x kernels

    FYI... I know nothing about it, except for what I read below:

    "US-CERT is aware of active attacks against linux-based computing infrastructures using compromised SSH keys. The attack appears to initially use stolen SSH keys to gain access to a system, and then uses local kernel exploits to gain root access. Once root access has been obtained, a rootkit known as "phalanx2" is installed.

    Phalanx2 appears to be a derivative of an older rootkit named "phalanx". Phalanx2 and the support scripts within the rootkit, are configured to systematically steal SSH keys from the compromised system. These SSH keys are sent to the attackers, who then use them to try to compromise other sites and other systems of interest at the attacked site.

    Detection of phalanx2 as used in this attack may be performed as follows:

    * "ls" does not show a directory "/etc/khubd.p2/", but it can be entered with "cd /etc/khubd.p2".
    * "/dev/shm/" may contain files from the attack.
    * Any directory named "khubd.p2" is hidden from "ls", but may be entered by using "cd".
    * Changes in the configuration of the rootkit might change the attack indicators listed above. Other detection methods may include searching for hidden processes and checking the reference count in "/etc" against the number of directories shown by "ls"..."

    US-CERT link

    A check of my system was negative.

    Edit: Didn't find this with a search earlier, please post here instead:
    http://kubuntuforums.net/forums/inde...4695#msg144695
Working...
X