Skip to content
Naked Security Naked Security

Linux Australia gets pwned, rooted, RATted and botted

Linux Australia had a bit of a nightmare Easter Weekend. While the rest of us were loafing at the beach, the Penguinistas from Down Under were owning up to a pretty extensive cyberintrusion.

Linux Australia had a bit of a nightmare Easter Weekend.

While the rest of us were loafing at the beach, the Penguinistas from Down Under were owning up to a pretty extensive cyberintrusion.

The team has published a decent document setting out what happened, and it went something like this:

  1. Crooks broke into the organisation’s Conference Management server.
  2. Crooks got root on the server.
  3. Crooks installed a remote access Trojan (RAT) for later.
  4. Crooks rebooted the server and activated the RAT.
  5. Crooks “logged in” again and installed zombie malware, also known as a bot.
  6. While the crooks had access, a conference database backup took place to the server.

Ironically, the backup that was intended to deliver one leg of the “security trinity” (availability) ended up hurting one of the other legs (confidentiality).

That’s because the database dump as good as dropped a bucket-load of Personally Identifiable Information (PII) in the crooks’ laps:

The database dumps which occurred during the breach include information provided during conference registration - First and Last Names, physical and email addresses, and any phone contact details provided, as well as a hashed version of the user password.

Fortunately, payment card data is passed to a third party site for processing, and never stored by Linux Australia, so there were no credit cards numbers or other data of that sort in the information exposed to the crooks.

Missing from Linux Australia’s otherwise commendably frank breach write-up is:

  • Information about how the hashed passwords were stored. (This is useful to know, albeit not vital, because it gives a hint as to how successful an offline dictionary attack is likely to be.)
  • Information about the security hole or holes that let the crooks in. (The document rather conveniently calls it “a currently unknown vulnerability,” though clearly it was known to the attackers.)
  • Information about the RAT and zombie malware that was subsequently installed. (This is handy to know, but again not vital, because RATs and zombies are designed to allow attacks to develop as the crooks see fit, instead of following a predictable pattern.)

Usefully, the Linux Australia crew did publish a list entitled, “What steps were taken to prevent the threat of a similar breach in the future?”

We suggest you take a look at this list.

Even though some of the steps sound rather obvious, most security precautions seem that way in hindsight.

The thing is, even though the steps proposed by Linux Australia aren’t hard to do, they are very easy not to do.

Don’t use the “life’s too short” excuse: these guys are Linux gurus, and they got caught out.

In particular, take notice of this precaution:

The new host will have a far more rigorous operating system updating schedule applied to it.

Even if the exploit used by the crooks in this case really was a zero-day (an attack known only to the crooks, and for which no patch was available), that’s no excuse for being tardy with patches.

Firstly, most attacks don’t use zero-days to get in.

Secondly, even when crooks use a zero-day to get in, they often rely on additional, already-known, security holes to complete their attack.

Patch early, patch often!


I find it interesting that people who should know better don’t follow the processes which they insist others follow. I’ve been in IT for a many years and I’m guilty of this too. I tell everybody I know that backups are not just a good idea but necessary but my personal backup activities are casual at best. I’m sure there’s a scientific name for this type of behaviour.


Even though Paul didn’t point it out, I will: Sophos has a free version of Linux Antivirus as well as the enterprise server offering:
— this means that at a minimum, you can try it out and see if it works for you, should you be running Linux.


True dat! (The official release of the free edition was announced just after I published the article :-)

To clarify what I didn’t in the article: both the free and enterprise versions include on-access scanning, a.k.a. real-time scanning. That means files are filtered and checked as you access them, *before* they can be opened and used.

This provides virus prevention as well as detection, because access to infected files is automatically blocked. You can’t load bad JavaScript into a browser, open booby-trapped images in your image viewer, run Trojan binaries, or serve up malicious web pages to an outside visitor…


Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!