Linked by David Adams on Wed 30th Mar 2011 16:02 UTC
Privacy, Security, Encryption Hearkening back to the Sony Rootkit brouhaha from a few years ago, a security researcher is claiming in a Network World article that he detected factory-installed keyloggers in two brand new Samsung Laptops. Samsung has made no official response, but a tech support supervisor contacted by the author said that the keystroke logging software was installed by Samsung to "monitor the performance of the machine and to find out how it is being used."
Thread beginning with comment 468414
To view parent comment, click here.
To read all comments associated with this story, please click here.
BluenoseJake
Member since:
2005-08-11

Uh, no...

The term rootkit originated in Unix systems, and Linux is not immune, the source of most rootkits in Unix\Linux is crackers who gain root access through normal means, mainly security holes in other software running on the system. The cracker then installs the rootkit himself, if the exploit he used allows him to gain root access. This allows him access even if the original exploit is fixed.

Spreading the same old crap that Unix\Linux is magically immune to these things doesn't help anybody, especially people who take your words to heart and then get burned.

Now on the other hand, they are much easier to detect in Linux\Unix, so I think a lot of the cracker types are falling back on the old standbys of replacing standard commands like login with trojans, which is easier to do, and if you do that to a bunch of commands, you can cover more bases.

Reply Parent Score: 6

Morgan Member since:
2005-06-29

Actually that's not entirely true. As BluenoseJake said, privileges can be escalated through the use of suspect userland software. But it is still more difficult by far to do so on alternative OSes compared to Windows. Though, Win7 has made a lot of progress in security too.

Reply Parent Score: 1

BluenoseJake Member since:
2005-08-11

No, you just need to be hacked using an exploit that will give the cracker root access. It has nothing to do with the user.

Reply Parent Score: 2

Morgan Member since:
2005-06-29

Please show me where in my post I said that *nixes are "magically immune" to malware? Oh that's right, I didn't.

You make a valid point, but you don't have to deliberately misquote me to make it. That's juvenile and makes you out to be less intelligent than you obviously are.

I stand by my original post, wherein I said the same thing as you: It's difficult but not impossible to infect a *nix box.

Reply Parent Score: 2

BluenoseJake Member since:
2005-08-11

Please show me where in my post I said that *nixes are "magically immune" to malware? Oh that's right, I didn't.


I never quoted you at all.

you said:
It's highly doubtful that any GNU/Linux or BSD distribution contains something like that, and it's very difficult (but not impossible) to infect such OSes with rootkits. It would depend on an absolutely moronic user


Which was what I was addressing, with rootkits on Linux, it's not "the moronic user" that is the issue, it's other software running on the box. Please read a comment before getting your feathers ruffled.

Reply Parent Score: 2