this post was submitted on 25 Aug 2024
1 points (100.0% liked)

Technology

58458 readers
5160 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 5 comments
sorted by: hot top controversial new old
[–] henfredemars@infosec.pub 0 points 1 month ago* (last edited 1 month ago)

"At the time of this writing, the persistence technique used (udev rules) is not documented by MITRE ATT&CK," the researchers note, highlighting that sedexp is an advanced threat that hides in plain site.

These rules contain three parameters that specify its applicability (ACTION== "add"), the device name (KERNEL== "sdb1"), and what script to run when the specified conditions are met (RUN+="/path/to/script").

[–] ilmagico@lemmy.world 0 points 1 month ago

Sure, once you have root on the host system you can pretty much do whatever you want ... adding entries to udev isn't anything revolutionary.

[–] LainTrain@lemmy.dbzer0.com 0 points 1 month ago (1 children)

"Malware"? Fucking cybersec press is the worst.

What's next, they're gonna call "sudo" a 0-day vuln?

[–] MonkderVierte@lemmy.ml 0 points 1 month ago* (last edited 1 month ago) (1 children)

Sure, but this isn't a privilege escalation, this requires privilege escalation, and it merely installs a backdoor that preserves that privilege.

It's like installing something in cron or systemd, it's not a vulnerability in itself, but it can allow an attacker to add a backdoor once they exploit a vulnerability once.