Then as a Linux user it does not apply to me or do I have to remove
it and How ?
On 09/06/2014 08:47 PM, Mark Bidewell
wrote:
Interesting, I got an alert at 6:33PM. My PCs are
OSX, Linux Mint and SolydXK with assorted VMs. I'm scanning,
but I wonder if there is a malfunction as the bot detected was
Windows related. Go to: https://amibotted.comcast.net/.
My output reads:
================
Bot
Notes:
Threat
behaviors: Downloads rootkits and steals
sensitive information.
Threat
type (intent): Information Stealer (Information
Theft & Sublease tool).
Alternate
names: W32.Rootkit /W32.Alureon/
W32.Renos/W32.TDSS/W32.DNSChanger
Threat
behavior description:
The TDL/TDSS
Gang (aka., Tyler Durden Loader). The TDL rootkit
is a Master Boot Record (MBR) infector, targeting Microsoft
Windows systems. The latest TDL rootkit is currently Version
4, and utilizes MBR hooking, a process that deceives a user
by appearing to have been initially deleted. Upon a system
restart, the rootkit/trojan is re-installed. This provides
the remote attacker highly persistent backdoors into victim
systems. Public research estimates the TDL/TDSS group to
have been in operation since mid-2008.
Observed
traits:
The TDL/TDSS rootkit has been observed spreading via spam
and phishing e-mails. The observed stages of infection are
as follows:
Infect a victim (Stage 1) via spam, drive-by-downloads, and
malicious attachments.Wait idle until the Stage 2 Trojan is
ready for download.
Load a rootkit Trojan (Stage 2).
Alter the system to obfuscate Stage 1 and 2 infections
(Stage 3).
Infect other sites, allowing third-party access to sensitive
information.
Capabilities:
After an initial infection, the Stage 2 rootkit is normally
loaded via a fast-flux worm. Once the infection has passed
to Stage 3, various other threats (such as ZeusBot, Buzus,
RogueAV, PoisonIvy, etc.) may be installed and utilized by
criminal operators. The authors behind the RudeWarlockMob
are members of a professional criminal organization that
also offers affiliate funding to anonymous distribution
providers, infection operators, and other criminals.
Times
Seen: 23
|
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org