Week 5. Linux, are you safe?
Back in the 90s when Linux had gained its momentum, many people, especially
software developers, have preferred
to use Linux over Windows. All of the great things about Linux spread
quickly. A few years later, open source development started its trend. I
must admit, open source development has helped the software industries enormously.
Development time reduced from years down to months, and months down to days.
However, every good comes something bad. It is the law of nature. Every
time should there be a virus outbreak; the
first thought came to people's mind is Microsoft Windows. It must be MS Windows
that are attacked. That is the truth,
but why? It is simply because MS Windows gained a majority in the personal computer
market. There was no benefit for hackers to put malware into Linux
machines. That is not true anymore. Linux market has picked up with all
of the enhanced interfaces, easy to install and update, very flexible, and most
importantly ... it is free!
Like I said, every good comes something bad. Linux is free, is flexible, is open source. Because of that, Linux attracts hackers more than ever. It becomes the tool for them to learn, to exploit, and to hack. Let's pick a case for a discussion, say a company releases an Ethernet adapter that supports both Windows and Linux. What that means is that two drivers are developed, one for Windows and one for Linux. The driver for Windows is most likely closed source while the Linux driver is undoubtedly open source. The hacker can use the open source driver to learn about the weaknesses in the firmware of the network adapter. The hacker then turns around and attack the Windows machine. The hacker can also choose to hack the Linux machines that use such adapter. He or She can then use the machine to attack others.
In April 2017, Project Zero team at Google figured out some of the weaknesses in Broadcom WiFi module that is used by many Android mobile phones. According to Beniamini, the communication between Broadcom's Wi-Fi module and the driver is not secure (Beniamini, 2017). The holes in the communication protocol allow a hacker to send messages to the driver from outside as if they came from the firmware.
Eric Brown, in his article, Linux Malware on the Rise: A look at Recent Threats, stated that the number of malware in Linux machines increased by 300 percent in 2016 compared to the previous year (Brown, July 2017). In the same comparison, MacOS's malware increased 370 percent.
Like I said, every good comes something bad. Linux is free, is flexible, is open source. Because of that, Linux attracts hackers more than ever. It becomes the tool for them to learn, to exploit, and to hack. Let's pick a case for a discussion, say a company releases an Ethernet adapter that supports both Windows and Linux. What that means is that two drivers are developed, one for Windows and one for Linux. The driver for Windows is most likely closed source while the Linux driver is undoubtedly open source. The hacker can use the open source driver to learn about the weaknesses in the firmware of the network adapter. The hacker then turns around and attack the Windows machine. The hacker can also choose to hack the Linux machines that use such adapter. He or She can then use the machine to attack others.
In April 2017, Project Zero team at Google figured out some of the weaknesses in Broadcom WiFi module that is used by many Android mobile phones. According to Beniamini, the communication between Broadcom's Wi-Fi module and the driver is not secure (Beniamini, 2017). The holes in the communication protocol allow a hacker to send messages to the driver from outside as if they came from the firmware.
Eric Brown, in his article, Linux Malware on the Rise: A look at Recent Threats, stated that the number of malware in Linux machines increased by 300 percent in 2016 compared to the previous year (Brown, July 2017). In the same comparison, MacOS's malware increased 370 percent.
Sources:
Gal Beniamini (April 4, 2017). Over The Air: Exploiting
Broadcom's Wi-Fi Stack (Part 1). Retrieved from https://googleprojectzero.blogspot.in/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html.
Gal Beniamini (April 11, 2017). Over The Air: Exploiting
Broadcom's Wi-Fi Stack (Part 2). Retrieved from https://googleprojectzero.blogspot.in/2017/04/over-air-exploiting-broadcoms-wi-fi_11.html.
Eric Brown (July 7, 2017). Linux Malware on the Rise: A look
at Recent Threats. Retrieved from https://www.linux.com/news/2017/7/linux-malware-rise-look-recent-threats
Comments
Post a Comment