Off-Topic > Off-Topic - The Funnies
Innovative TC usage, qemu windows malware
(1/1)
curaga:
https://www.bleepingcomputer.com/news/security/windows-infected-with-backdoored-linux-vms-in-new-phishing-attacks/
Even malware authors realize how nice TC is ;)
qemu.exe happens to be signed, they run TC inside qemu on windows and then connect back. The article shows they mastered the use of bootlocal and filetool.sh.
gadget42:
reminds of Rule 34
https://xkcd.com/305/
https://en.wikipedia.org/wiki/Rule_34
just sayin'
nick65go:
Innovative? yes; [very] easy to defend against it? YES!
The solutions are provided in the article already:
"To detect and block these attacks, consider placing monitors for processes like 'qemu.exe' executed from user-accessible folders, put QEMU and other virtualization suites in a blocklist, and disable or block virtualization in general on critical devices from the system BIOS"
The [main] problem is to suspect /monitor that some process is eating the CPU energy. And to restrict common user rights [which is implicit in big corporations with proper qualified IT services].
PS: for my taste the kernel is still a little big for such an attack goal. I mean a KolibriOS with a kernel + OS of [100-320] KB could have more chance on private machines.
However on W11 the latest WSL2 (Windows Subsystem for Linux) has configuration parameters for global/individual VM (virtual machines) regarding firewall rules. Of course using WLS2; not qemu (which is mono-CPU). Why use qemu when WSL2 is "free" even for W10.
Navigation
[0] Message Index
Go to full version