Coun mining malware

Discussion in 'The Computer Room - Computer Talk' started by Reedone816, Mar 8, 2018.

  1. Dirty Dog

    Dirty Dog MT Senior Moderator Staff Member

    • LifeTime Supporting Member
    Joined:
    Sep 3, 2009
    Messages:
    14,576
    Likes Received:
    3,179
    Trophy Points:
    308
    Location:
    Pueblo West, CO
    Bootable disks take too long. :)
    It's not really brute force... Open a terminal window (or command prompt on Windows or MacOS) and type a one line command. Instant remote shell access. Without a password. At that point, there are hundreds of ways to make the shell persistent and escalate privileges. And it's easier to access other machines on that network than it is to access the first one remotely.
     
  2. Xue Sheng

    Xue Sheng All weight is underside

    • Supporting Member
    Joined:
    Jan 8, 2006
    Messages:
    27,682
    Likes Received:
    3,542
    Trophy Points:
    308
    Location:
    North American Tectonic Plate
    Linux us by design more secure than Windows, however it is not as prevalent which makes it less of a target. But, remember it is free so it is downloadable for anyone who whishes to try and break it.

    As for rogue flash drives and disks, there are multiple ways to handle it, but most start with "Do not allow auto run"

    I was once at a seminar where the speaker was an NSA IT guy and he said then that unless you pull your hard drive, shred it and burn it,,,,, he would find something on it. But the software he was using is the stuff of governments that can afford to pay big bucks for IT forensic equipment. All I came away with from that seminar that was unless I take my PC, unplug it and lock it in a closet, it is not safe. That seminar was 10 years ago and I have changed my view on PC safety. Now I believe that unless you unplug your PC, drop it in a 55 gallon drum of concrete. seal the drum and the lock it in a closet....it will be attacked.

    I use to run a tracking software on my home PC and it started telling me that someone from Korea was trying to access my PC. And then it popped up with Central America. It went back and forth between Korea and South America for a few seconds and then my mouse started to move all by itself. So I went to my security suite to lock them out. It was then I realized I forgot to password protect my security suite, because I was now locked out of it. I have to admit it was cool to watch and since I had no important info on my PC I simply shut it down, took it off the internet, wiped it and started from scratch. But I secured my security system and ran “ipconfig /flushdns" before I put it back on the internet
     
  3. JowGaWolf

    JowGaWolf Grandmaster

    Joined:
    Aug 3, 2015
    Messages:
    5,875
    Likes Received:
    1,659
    Trophy Points:
    263
    Unfortunately this is true. People usually don't lock down their computer access.

    If you really want your systems to be secure then it's going to take a multiple approach. For the most part it's the human behavior that put weak points into security. Most people don't listen to the security advice nor do they follow the security recommendations. Mac users are a good example, many of them are still running around without antivirus software or firewall software. Because they feel their system is secure they engage in risky behavior. No matter what you do, if you can't get the human to do his or her part, then your security efforts will be minimum at best.

    A simple email can F-up a world of secure measures.
     
    • Agree Agree x 1
  4. Xue Sheng

    Xue Sheng All weight is underside

    • Supporting Member
    Joined:
    Jan 8, 2006
    Messages:
    27,682
    Likes Received:
    3,542
    Trophy Points:
    308
    Location:
    North American Tectonic Plate
    If I felt like typing more I would tell you all about the time I had a friend of mine contact me from Singapore and the 20 some odd e-mails we had back and forth. He apparently had to go there to help his sister who got sick and he got robbed and had no money...But I think I may have scared him, because he stopped responding. All I told him was the he was in luck, My nephew "Wang Bàolì èmó" who he had meant, was in Singapore on leave from the PRC Special forced unit and I would have his mother wire the money to him and he could meet him somewhere and give him the money...he never responded

    1) my firend has no sister, was never in Singapore and his e-mail had been hacked
    2) 王 暴力恶魔 ("Wang Bàolì èmó") translates to Wang Violent Demon
     
    • Funny Funny x 2
  5. JowGaWolf

    JowGaWolf Grandmaster

    Joined:
    Aug 3, 2015
    Messages:
    5,875
    Likes Received:
    1,659
    Trophy Points:
    263
    View your router log and you can see just how much a network is attacked. Unfortunately most people don't check out their router logs to see what's being blocked and what's getting in. Consumer PCs are the worse and the Internet browsing that employees do is similar to the browsing habits they have at home. It's unrealistic to think that any computer won't be attacked. If it's out there then it's a at risk. It's not different than humans walking on the street. The more you walk on the streets and the riskier your walking behavior is (location, awareness, etc.) the more like you'll be attack. Some attacks may be brute force (aka mugging) and other attacks are less harmful but annoying like SPAM (someone on the street coming to you asking for money).

    Regardless of the OS someone is going to be trying.
     
    • Agree Agree x 1
  6. Dirty Dog

    Dirty Dog MT Senior Moderator Staff Member

    • LifeTime Supporting Member
    Joined:
    Sep 3, 2009
    Messages:
    14,576
    Likes Received:
    3,179
    Trophy Points:
    308
    Location:
    Pueblo West, CO
    True. And not only is it freely downloadable, the source code is readily available too. You don't even have to reverse engineer it. That's both a strength and a weakness of *nix.

    That assumes it's actually a real USB drive. Not a rubber ducky. Or a bash bunny. Or any of the other things that just look like a USB drive but are not. "Hey, I've got a cable but I forgot my charger. Can you plug my phone into your computer so it can charge a bit?" Owned.
    But it's a good start, yes. That puts us back to getting you to open that Really Cool and Informative PowerPoint file.
    I think social engineering may well be the single most important factor in computer security today.

    I agree with this completely.

    Which goes to show that as systems become more powerful, they also become more vulnerable. Modern computers have too many ways to access them to secure them all.
    Also shows the importance of backups and reset points. :)
     
    • Like Like x 1
  7. gpseymour

    gpseymour Sr. Grandmaster

    Top Poster Of Month

    • Supporting Member
    Joined:
    Mar 27, 2012
    Messages:
    15,151
    Likes Received:
    4,247
    Trophy Points:
    448
    Location:
    Hendersonville, NC
    I poked around Linux years ago. Unfortunately, it’s still not a viable option for those of us who need MS Office to be fully compliant with clients. And I’m so unfamiliar with software offerings on Linux that I couldn’t reasonably replace the rest of what I use, either.
     
  8. Buka

    Buka Grandmaster

    • MartialTalk Mentor
    Joined:
    Jun 27, 2011
    Messages:
    7,627
    Likes Received:
    4,444
    Trophy Points:
    448
    Location:
    Maui
    I'll take my chances.
     
  9. Dirty Dog

    Dirty Dog MT Senior Moderator Staff Member

    • LifeTime Supporting Member
    Joined:
    Sep 3, 2009
    Messages:
    14,576
    Likes Received:
    3,179
    Trophy Points:
    308
    Location:
    Pueblo West, CO
    Libre Office is MS Office compatible, and a part of the default install on a number of Linux distros. And if it's not part of the distro, it's still a free download. Likewise, there are open source options for most things you'd want. And in the (fairly uncommon) case where there isn't, you can run something like Wine on Linux that allows you to run Windows programs, but in a more stable, actually multi-threaded multi-tasking environment. Win Win. :)
    And if you MUST keep Windows around, you can always set up a dual boot option. My desktop still has Windows 10 on it. I rarely use it, but it's there. Honestly, the most common reason I boot to Windows is to test a new vulnerability. And even then I'm more likely to run it as several virtual machines (one for each version I'm testing...) on one of my Linux boxes.
     
  10. gpseymour

    gpseymour Sr. Grandmaster

    Top Poster Of Month

    • Supporting Member
    Joined:
    Mar 27, 2012
    Messages:
    15,151
    Likes Received:
    4,247
    Trophy Points:
    448
    Location:
    Hendersonville, NC
    There’s no real analog for Access, nor the same programming flexibility (VBA is native to MS Office), and some difference of functionality, even when using the same file type. And if that portion of my work has to be on Windows (since my graphics software isn’t on Mac), there’s little reason to maintain a Linux install just for browsing when I’m not working.

    EDIT: Wine is a consideration. I wasn’t aware there was a Linux variant (I know it from Mac).
     
  11. Buka

    Buka Grandmaster

    • MartialTalk Mentor
    Joined:
    Jun 27, 2011
    Messages:
    7,627
    Likes Received:
    4,444
    Trophy Points:
    448
    Location:
    Maui


    W:)hich is why I take my old hard drives and do far worse than that to them. And I don't even have anything to hide.

    Except for, you know, stuff we say here on MT.
     

Share This Page