¡®Lenux•Mac OS X not in the safe zone¡¯¡¦Security weakness found
Lee Gyung Tak | kt87@ | 2017-03-14 10:59:08


If we talk about operating system (OS) security weak points, we often think about only Windows, but recently the loophole in the security of ¡®Linux¡¯ and ¡®Mac OS X¡¯ has been found.

According to Korea Internet and Security Agency) on March 13, a recent vulnerability that exploits`` use-after-free ``in the Linux kernel``s datagram congestion control protocol (DCCP) and obtains route authority or causes service refusal has been found. Use-after-free vulnerability is a malicious code that enables hackers to spread code into somebody¡¯s PC remotely by using specific software (SW) and it causes memory problems.

According to KISA, systems using earlier versions, including Linux kernel 4.9.11, are all exposed to this vulnerability, and users of Linux-based OS such as Debian, Ubuntu, Red Hat, SUSE and Fedora are required to have the latest version and security updates to prevent problems.

Park Jong-won- a senior researcher of the KISA vulnerability analysis team, mentioned, ¡®This vulnerability is a part of IPv6, and although it is not officially IPv6-enabled in Korea, users of popular Linux versions should visit the manufacturer``s homepage and download the latest patches, or modify the source code to compile the kernel.¡¯ According to the security industry a new Ransomware for Mac OS X has also been discovered. The Ransomware has been developed by Swift, Apple``s software development tool, and is used to upload popular SWs, such as Adobe Premiere Pro and Microsoft Office, to a torrent, disguised as crack files for free use.

The more serious problem of the Ransomware is that there is no code to communicate with the Command & Control (C & C) server. This means that the key used to encrypt the file cannot be transferred to the hacker, so the victim cannot decrypt the file even if he or she pays the PC recovery cost. Ransomware, which targets Mac OS X, has been found since last year from time to time. Ransomware, which is called Key Ranger, has infected SW of inside Mac OS and disappeared after 3 days. PC recovery by encrypting the file requests a bit coin payment of USD 400.

Security industry expert said, ¡®Users of Linux and Mac operating systems cannot be relieved. We recommend all users to use genuine software, and backing up all important data offline is the most important precaution that can minimize ransomware damage¡¯.

By Lee Gyung Tak kt87@


[ copyright ¨Ï The Digitaltimes ]