No video

Linux Ransomware

  Рет қаралды 146,692

The PC Security Channel

The PC Security Channel

Күн бұрын

Linux Ransomware: Can ransomware run natively on Linux? In this video we take a look at Revil and how it can encrypt your data even on a Ubuntu Linux OS.
Intezer Analyze: analyze.inteze... (sponsor)
Intezer Protect: protect.inteze... (sponsor)
🔥 Buy the best antivirus/security products with exclusive discounts and support this channel:
www.thepcsecur...
🔥 Want to join the community and participate?
discord.tpsc.tech
⭐️Want us involved in the cybersecurity of your business? Interested to sponsor or work with us? Check out the business section at: www.thepcsecur...

Пікірлер: 770
2 жыл бұрын
This, kids, is why distros audit their packages and tell you that you may be hacked if you use something external
@nathanlamaire
@nathanlamaire 2 жыл бұрын
Sometimes even official repo can be hacked, it just have to happen much less likely. Linux Mint had the experience that hacker successfully hacked a main server and serve malicious disk images, luckily moderator found out in 2 hours (IIRC) and put them down. Some of Git server were hacked, or owner had intentionally added malicious code to the repo.
2 жыл бұрын
@@nathanlamaire yes, Mint had the entire ISO hacked lol
@shoukokomi8081
@shoukokomi8081 2 жыл бұрын
@ you mean the website? that happen years ago? try to research dumb wincrap user
@shoukokomi8081
@shoukokomi8081 2 жыл бұрын
@@szymex8341 Oh yes I know but the problem only last for hours not even a day
@SpreadsheetAccountingIndo
@SpreadsheetAccountingIndo 2 жыл бұрын
having all files on home folder encrypted (as long as you have your backup) is better in comparing to unseen threat and malicious software running on background like what happend on windows. I'm not afraid of malicious program on linux.
@FakhryHTatanaki
@FakhryHTatanaki 2 жыл бұрын
Never assume any system is perfectly secure, the sys admin also has a great responsibility to ensure that a system is secure because no matter how secure your OS is, bad practices (like mindlessly giving programs high privileges, downloading from untrusted sources, leaving unused services open, running outdated software, etc.. ) will lead to trouble.
@ashwinrawat9622
@ashwinrawat9622 2 жыл бұрын
Thats Fakhing true.
@tobznoobs
@tobznoobs 2 жыл бұрын
as I've said before, part of my job was to delete viruses from CentOS servers, and we also got a ransomware 10 yrs later in another company, and it targeted a linux fileserver and windows sap server. all those who say linux doesn't get infected are pseudo techie guys who have not dealt with linux servers in their lives.
@pikaa-si9ie
@pikaa-si9ie 2 жыл бұрын
Just use temple OS for your server
@Masaliantiikeri
@Masaliantiikeri 2 жыл бұрын
Have you ever heard of Linode or KernelCare?
@superslimanoniem4712
@superslimanoniem4712 2 жыл бұрын
Everything gets infected at some point, but it's probably more rare than windows viruses
@stefansuch1588
@stefansuch1588 2 жыл бұрын
A lot of people presumably don't write viruses for Linux because there are a lot of people who don't use it, but yeah Linux computers and fileservers can get viruses
@lilysansetsukonnoriri3612
@lilysansetsukonnoriri3612 2 жыл бұрын
@@superslimanoniem4712 it's much more rare because a lot more people uses windows. Wait till linux gets super popular and easier to use, then you'll see more viruses
@aymanhassan8178
@aymanhassan8178 2 жыл бұрын
The reason why linux is called the unhackable os is because 90% of the time your only pkgs are coming from your distro maintainers' server And the other 10% are from building an open source projects.
@jyow-xe7pw
@jyow-xe7pw 2 жыл бұрын
Which is why I stick to debian and use official websites when I have to add to the software store. The AUR, I'm sure is fine but when anyone can add packages in, seems like it would be easy for something to "slip through the cracks"
@IIGrayfoxII
@IIGrayfoxII 2 жыл бұрын
And those open source projects on Git are easily viewable, you can also view changes done.
@jyow-xe7pw
@jyow-xe7pw 2 жыл бұрын
@@IIGrayfoxII I'm not that technically gifted lol
@MBaltz
@MBaltz 2 жыл бұрын
It's wrong I think, look the archlinux with the AUR.
@jyow-xe7pw
@jyow-xe7pw 2 жыл бұрын
@Watcher oh ok, I didn't know. Like I said I've been on debian.
@fatinebadr7244
@fatinebadr7244 2 жыл бұрын
as long date user of linux ,you don't need a virus or ransom to break the system, you can easly break the system (if you use wrong command , or inappropriate one ,there also dependecies knowns problems that can sometimes do serious dmg if you try to solve them with wrong commands)
@nerv4316
@nerv4316 2 жыл бұрын
A person who never used Linux for a month talking about Linux users.
@fatinebadr7244
@fatinebadr7244 2 жыл бұрын
@@nerv4316 btw i use arch now, and i don't know what are you talking about, (if i did say something wrong ,feel free to say what wrong )
@ArmiaKhairy
@ArmiaKhairy 2 жыл бұрын
@@fatinebadr7244 I believe ```sudo rm /``` used to wipe the system.
@Cybersharky_
@Cybersharky_ 2 жыл бұрын
@Polaris Lakewell d egenerate
@math001
@math001 2 жыл бұрын
You can do that to Windows as well. What are you on about
@sugaryhull9688
@sugaryhull9688 2 жыл бұрын
I can't imagine that this would be likely to affect users installing from official repos
@giuseppe4870
@giuseppe4870 2 жыл бұрын
Or npm
@kquote03
@kquote03 2 жыл бұрын
True. However your should always check when updating/installing on a production environment. I dont recall the exact name or event, but some company that used npm got hacked because someone pushed a malicious package to the official repos that had an extremely similar name to another package.
@daemonace5910
@daemonace5910 2 жыл бұрын
@Dailox At the end of the day, linux is more "secure" because of the user behaviour tendencies instead of the actual system capability
@ArthursHD
@ArthursHD 2 жыл бұрын
They could still find a way in and run it by themselves.
@kquote03
@kquote03 2 жыл бұрын
@@daemonace5910 I mean if that were true then everyone would be using windows server instead ;)
@kquote03
@kquote03 2 жыл бұрын
Can you do linux hardening tutorials? (It seems youtube deleted my comment, sorry for posting twice)
@patricklechner190
@patricklechner190 2 жыл бұрын
+2
@tom-mo-
@tom-mo- 2 жыл бұрын
+3
@kiiiburn
@kiiiburn 2 жыл бұрын
Maybe because of the hardening comment...
@philcooper9225
@philcooper9225 2 жыл бұрын
@@kiiiburn yeah KZfaq is soft
@alex15095
@alex15095 2 жыл бұрын
I recently found a post on the void linux subreddit about PlagueOS which seems to be an ongoing project to make a hardened Linux distro. It might be interesting to check out
@markusTegelane
@markusTegelane 2 жыл бұрын
This is why we say that you should always avoid downloading an executable and running it, whenever possible in Linux
@daemonace5910
@daemonace5910 2 жыл бұрын
Because it's much safer to do that in windows?
@markusTegelane
@markusTegelane 2 жыл бұрын
@@daemonace5910 No, it's just that it is about as unsafe as doing it in Windows
@Why72833
@Why72833 2 жыл бұрын
Gets error about musl... I see this as an absolute win
@superslimanoniem4712
@superslimanoniem4712 2 жыл бұрын
Yeah, go through trusted repos if possible
@MaksKCS
@MaksKCS 2 жыл бұрын
@@markusTegelane yeah just don't use your computer, then you can't get infected...
@BoredKevin
@BoredKevin 2 жыл бұрын
Everyone else talking about cyber security but nobody talks about why he records his videos at 12.00 AM which is almost certainly past his bedtime
@rajat0610
@rajat0610 2 жыл бұрын
maybe he runs a vm and does not set the time, so it looks like he is recording at 00:xx
@hrsh042
@hrsh042 2 жыл бұрын
@@rajat0610 doesn't happen normally
@orkhepaj
@orkhepaj 2 жыл бұрын
boring
@HCG
@HCG 2 жыл бұрын
Because no one gives a fuck.
@ygjt76v0-----
@ygjt76v0----- 2 жыл бұрын
Legend 🤣😅
@ExtromniaStudios
@ExtromniaStudios 2 жыл бұрын
How do you not have so much more subs, I’ve been watching you for a very long time, and I think that you deserve more.
@janialander414
@janialander414 2 жыл бұрын
Well of course Linux can run malicious software, it is after all General Purpose Operating System. But...when it comes to that example: First you needed to download that, outside from package repository, not very many Linux users do so...then you needed to set that file executable...and then you needed to run it...and of course from user account having valuable stuff writable for said malware...
@vaisakhkm783
@vaisakhkm783 2 жыл бұрын
Or you need to find a zero day.... In a code base which people from around the globe simultaneously missed....
@raphaelcardoso7927
@raphaelcardoso7927 2 жыл бұрын
It could be in an installation script of something else. A wget then chmod then run
@janialander414
@janialander414 2 жыл бұрын
@@raphaelcardoso7927 Anyways, you'll need to download stuff from outside source...
@djvar94
@djvar94 2 жыл бұрын
At the end of the day, security is a concept that comes down to having sense and sensibility in whatever you do in your everyday life. For computers it's about whether or not you trust whatever you downloaded and take it with a pinch of salt. If you steer away from downloading from untrusted sources then you should keep yourself in pretty good shape
@davehenderson3739
@davehenderson3739 2 жыл бұрын
Yeah don't download software you don't know about and don't go to sketchy sites.
@5izzy557
@5izzy557 2 жыл бұрын
Good Opsec is the best line of defense.
@Masaliantiikeri
@Masaliantiikeri 2 жыл бұрын
Good thing we have CoW file systems like BTRFS and ZFS. We can rollback file system changes in between snapshots. Basically it can't encrypt all the datasets unless you have root access.
@ArthursHD
@ArthursHD 2 жыл бұрын
Don't be fooled. Where is will there is a solution. Ransomware on Windows often deletes Shadow Copies.
@ThatLinuxDude
@ThatLinuxDude 2 жыл бұрын
@@ArthursHD BUT to be fair in Windows it needs Administrator Privileges in order to do so. So it's likely this'll be the case here as well.
@mehdi7586
@mehdi7586 Жыл бұрын
keep in mind that this wouldn't be able to encrypt and alter any files outside the home directory of the user that ran the malware, if a user got infected with such malware it won't affect other users, in the case of a server you usually have your database and important files stored outside the home directory, and everyone is advised against using the root user directly or even allowing root login in ssh. so in most cases on you will be fine on a server
@mehdi7586
@mehdi7586 7 ай бұрын
@@regallomo you could do that but it would be cumbersome. I just keep a backup of my important files on an external drive. and yes you can set the file permissions to let you browse the files but not write to them.
@SnowyRVulpix
@SnowyRVulpix 2 жыл бұрын
The important thing here is you didn’t run that command as sudo or superuser, meaning the damage it can do is very limited.
@lilith1504
@lilith1504 2 жыл бұрын
Unless some virus can affect to root without password, everything can fix easily
@injamul
@injamul 2 жыл бұрын
Ransomware targets user data and user-data exists in non-root directory....
@speedibusrex
@speedibusrex 2 жыл бұрын
The command shown in this video was not executed as a superuser, and encrypted the entire home dir of the user.
@gonzalolog
@gonzalolog 2 жыл бұрын
Why would be harmful to run it with root when it encrypts YOUR files, if it destroyed OS files, reinstall and you're done
@deleater
@deleater 2 жыл бұрын
Even more important thing was he ran the program in a virtualized Ubuntu. Even with sudo, I suspect zero important files could be damaged.
@ananon5771
@ananon5771 2 жыл бұрын
no system is perfectly secure,but a tip for most users is that to not make any file executable on linux without getting it from a trustable source,and ideally get most,if not all programs from a trusted package manager (APT is really good,the AUR is not so good (the AUR is powerful,but definitely not the most secure)) and not off a browser like on windows.
@brentsummers7377
@brentsummers7377 2 жыл бұрын
And be careful with using a PPA. Try to do some research into who has written the PPA.
@jonissesmarchadesch7025
@jonissesmarchadesch7025 2 жыл бұрын
So the same in Windows then
@thefoolishgmodcube2644
@thefoolishgmodcube2644 2 жыл бұрын
AUR is not so good? Does that mean most Arch Linux users are fucked?
@ananon5771
@ananon5771 2 жыл бұрын
@@jonissesmarchadesch7025 if windows package managers didn't suck,then yes
@hihello-tp3wi
@hihello-tp3wi 2 жыл бұрын
@@thefoolishgmodcube2644 it's quite common for experienced arch users to warn against blindly installing AUR packages. It's fucked if you aren't installing trusted packages
@GC-qe8vc
@GC-qe8vc 2 жыл бұрын
I would expect the Security Channel to explain the difference between privillege escalation and a script that operates with regular user privilleges. When malware by the same name encrypts an entire computer under Windows vs the user's home folder under Linux, then claiming "there's no difference" is misleading and false. And the message "Linux gets malware too" even if well-intentioned, ends up being the good old FUD tactic of closed-source companies (a term coined when Microsoft's official strategy towards Linux was to spread fear, uncertainty and doubt). There's a good reason Linux dominated the server market and continues to do so.
@creepingmee
@creepingmee 2 жыл бұрын
Honestly, if you would do this, you are just as likely to type rm -rf / I mean c'mon....
@RinksRides
@RinksRides 2 жыл бұрын
I tried this command recently... F U LOLZ
@ReloadedK
@ReloadedK 2 жыл бұрын
@@RinksRides Please don't force remove anything unless you know exactly what it is. The rm command is to be respected, always
@gasun1274
@gasun1274 2 жыл бұрын
@@ReloadedK i had to delete the xorg conf file with rm once because my DE won't boot with it. i read the guide on how to use it like a medieval monk copying the bible
@samuelefilice4661
@samuelefilice4661 2 жыл бұрын
@@RinksRides never run random commands in Linux, expecially if you run it like an administrator (with sudo or doas or e ven directly by the root account)
@kylek.3689
@kylek.3689 2 жыл бұрын
I have now twice typed "rm -rf /*", trying to type "rm -rf ./*"
@NiceMicroTV
@NiceMicroTV 2 жыл бұрын
running an ELF file with executable permissions on Linux is not surprising. What would be more interesting for us Linux users is how do you get this file, how does it make itself executable, and how does it run itself in a real environment, as I won't just get a random binary file from the internet and run it.
@ArmiaKhairy
@ArmiaKhairy 2 жыл бұрын
It could be within a bundle of executable admins use to configure stuff on servers, they may just runn all the executables sequentially in a folder without cheking them first.
@NiceMicroTV
@NiceMicroTV 2 жыл бұрын
@@ArmiaKhairy yeah, but I could literally whip up a bash script in like 20 minutes that encrypts all your data with a random password and leaves a scary message in every folder. The fact that this can be done to a system is not news, especially most Linux systems come with nice default encryption packages. What would be interesting is to see what mechanism does it use to get into the system in the first place. whatever is shown in the video is not even remotely interesting.
@jasoncravens1124
@jasoncravens1124 2 жыл бұрын
@@ArmiaKhairy If that is the case, you have a way bigger problem than that ransomware script. Someone can freely add things to your server. Plus give it execute permissions?
@muhammadnashirakrom2935
@muhammadnashirakrom2935 2 жыл бұрын
I've question,this ransomware only infected home current user isn't it? It can't infected the whole linux system or home other user? Because linux is modular, in Linux we have file permission(supported by file system') and user level access, and we still input password whenever run command who need access super user level access like sudo. That's point above is not explain in your video? So we have secure Linux system with only remove or disable user who run the Ransomware or infected by it and the system is normal or safe again.
@KeithBoehler
@KeithBoehler 2 жыл бұрын
This is a good question. I hope it gets answered.
@malikulamin9948
@malikulamin9948 2 жыл бұрын
theres many stupid peoples saying linux infected by virus, ransomware, in reality they bloody download the file and give root permission...and say linux are vulnerable...
@dikahadipriyanto1418
@dikahadipriyanto1418 2 жыл бұрын
Come to think of it i do not see he is entering password there, could it be he give access to root
@villan821
@villan821 2 жыл бұрын
btw I use Arch
@thebestwizz
@thebestwizz 2 жыл бұрын
As many said, a lot of our packages come from using distro pkg managers. But also, most of us who use Linux are not average users. If anything harmful is unpacked and installed it is most likely because of oversight, not ignorance.
@ChristopherGray00
@ChristopherGray00 Жыл бұрын
leave it to arch users to downplay and pretend that linux is all immune magical system, this is why we have a bad adoption rate, because of people being disingenuous and lying about the realities of linux, it's a great OS, but stop pretending its fucking magic. just stop.
@SmallXD
@SmallXD 2 жыл бұрын
I love your channel!
@NewRepublicMapper
@NewRepublicMapper 2 жыл бұрын
It’s not About Linux or Windows to make everything secure The Thing that you maintain your Cybersecurity is Your Common Sense
@igorthelight
@igorthelight 2 жыл бұрын
True! As it was stated in 6:15
@davidkachel
@davidkachel 2 жыл бұрын
A worldwide bounty on these people and fat rewards for turning them in, would soon put a stop to this.
@igorthelight
@igorthelight 2 жыл бұрын
... and get a lot of "fake" hackers get turned for the profit. Source - human history ;-)
@matman1975
@matman1975 2 жыл бұрын
Who made that file executable as most times a single file will not have executable rights. (Which user owns the file?) Unlike Windows, I do use Windows as well. :)
@swh77
@swh77 2 жыл бұрын
Actually tar preserves permissions. If a user downloaded tar archive, file inside could be marked as execuable.
@deleater
@deleater 2 жыл бұрын
@@swh77 whoa! That I didn't know. Thanks for this! When I am thinking about that, it sounds more scary than it sounds.
@plutonianfairy
@plutonianfairy 2 жыл бұрын
I don't get why there aren't any mainstream AV tools on Linux... Especially considering more average users are switching to linux these days...
@amin7581
@amin7581 8 ай бұрын
Because: 1. most hacker have no reason to hack linux as the number of people using it compared to windows is very very small. Meaning, not worth their time. Even if want to hack a linux computer, it would be a server from a big corps. 2. Most linux distro has no av because it's going to use too much ram. Making it not much better, or maybe even worse than Windows. 3. Most linux distro has no av because they knows that most linux user will download and install from official repos anyway.
@mrcrackerist
@mrcrackerist 2 жыл бұрын
I have seen some companies "security" and it makes me shiver. running web servers as root, downloading random pieces of code form the internet and etc... If you run random binaries form the internet then this happens, the major difference Linux does not auto execute unlike Windows, also most Windows users doesn't separate the admin user from a there main account.
@gabrielandy9272
@gabrielandy9272 2 жыл бұрын
only thing windows auto executes is Disk/usb/drives and you can disable this in the security panel, to make it "Asks" what to do or just don't do anything automatically.
@bobbuilder8855
@bobbuilder8855 2 жыл бұрын
Windows doesn't auto execute anything. Please don't spread false information.
@alex15095
@alex15095 2 жыл бұрын
@@bobbuilder8855 Oh Windows does auto execute alright. It auto executes Windows Update every single damn time. It executes it as admin. As soon as you plug in any device, Windows Update auto executes some proprietary driver installer from your device's vendor. It downloads arbitrary code and auto executes it as administrator, no UAC prompt either. Definitely nothing unsafe there..
@loganiushere
@loganiushere 2 жыл бұрын
@@bobbuilder8855 *hasn't by default since winxp
@computer_freedom
@computer_freedom 2 жыл бұрын
@@bobbuilder8855 All you need to do is get your program or script into the Startup directory. The use of "%USERNAME%" for the user name will make this the current user logged on at the time, and it will execute the next time that user logs on. There is no permissions needed to put this into the said directory. I did this to a friend of mine, without having physical access to his computer, and he struggled with his screen upside down for an hour before he figured out how to fix it.
@GabrielM01
@GabrielM01 2 жыл бұрын
now run this elf in a packaged snap with no file system permissions
@aleksic1234
@aleksic1234 2 жыл бұрын
*exactly*
@alex15095
@alex15095 2 жыл бұрын
Snap is proprietary software and complete treachery to the open-source community. Use Flatpak instead
@dikahadipriyanto1418
@dikahadipriyanto1418 2 жыл бұрын
As puppy linux user i guess this wont work, we use sfs or pet
@vaisakhkm783
@vaisakhkm783 2 жыл бұрын
Or run in a chroot sandbox
@GabrielM01
@GabrielM01 2 жыл бұрын
@@vaisakhkm783 even better
@iSamYTBackup
@iSamYTBackup 2 жыл бұрын
apple's supplier deserved it because they supply a anti right to repair corporation
@BruceCarbonLakeriver
@BruceCarbonLakeriver 2 жыл бұрын
thought the same xD
@badpiggies988
@badpiggies988 Ай бұрын
This is why Ubuntu strongly recommends that we not go into the OS’ files and disable the requirement for entering a password every time we run something as sudo. And besides, with the Linux community's gradual growth we seem to have gotten on the radar of cyberattackers recently; as horrifying as it is given the short supply of antivirus programs that exist for Linux OSes due to how complacent we Linux users have become about cybersecurity, in a way I see the existence of explicitly Linux-targeting malware like this that can run natively on it as a good thing, it's like a rite of passage for us- just like it was for Mac users many years ago.
@shady4tv
@shady4tv 2 жыл бұрын
Linux Support is my specialty and I have NEVER seen Linux Ransomware hit a system in the wild. This is not to say that it couldn't happen... just that it's very rare. Use packages from your repos if you can in production environments - you contact your support vendor Amazon, SUSE, Microsoft, Red Hat and have them package it for you if it doesn't exist if you pay for support. ....also PATCH! I can't stress this enough.
@impoppy9145
@impoppy9145 2 жыл бұрын
Well I've been using windows for 20 years now and I've never even been infected with ransomware. I'm pretty sure everyone else here never been infected by ransomware either. Does this mean Windows is unhackable and ransomware on windows does not exist?
@carlayacuzzi5553
@carlayacuzzi5553 2 жыл бұрын
Now Anti-Malware developers have to panic Windows users who see the possibility of moving to Linux, A well configured and hardened Linux is impossible to hack, Only AppArmor is needed | SELinux a well configured Firewall and a lot of common sense, Besides Linux users are not idiots. Greeting from Argentina
@gonzalolog
@gonzalolog 2 жыл бұрын
Well, you need *common sense* in order to not get a virus no matter what OS you're using, that's flawed
@bobbybologna3029
@bobbybologna3029 2 жыл бұрын
you have to do some seriously stupid sh** to even get as far as the video-op lol
@Windows11Official
@Windows11Official 2 жыл бұрын
*Most of Linux users
@orkhepaj
@orkhepaj 2 жыл бұрын
linux users arent any smarter than win users
@thecloudrazor
@thecloudrazor 2 жыл бұрын
SELinux probably would have prevented this.
@AaronTechnic
@AaronTechnic 2 жыл бұрын
Yea
@AlessandroBottoni
@AlessandroBottoni 2 жыл бұрын
This video is almost clickbait. Writing "ransomware" - or any other kind of malware - for Linux is quite easy. The problems are: 1) How do you deliver it? 2) How do you escape the user environment? So, yes, you *can* write ransomware for Linux BUT... you can do very little with it. To be honest, you can do very little damage to Windows as well, as long as the Windows system is managed by a knowledgeable administrator.
@GooogleGoglee
@GooogleGoglee 2 жыл бұрын
What I need to know is that Microsoft is building more code for Linux Kernel lately than the open community! This is worrying...
@gonzalolog
@gonzalolog 2 жыл бұрын
It still gets reviewed
@ChristopherGray00
@ChristopherGray00 2 жыл бұрын
you can't just push code into the kernel without it being reviewed first. not how it works at all.
@anonymouscyborg5610
@anonymouscyborg5610 2 жыл бұрын
Linux definitely has malware, and it is increasing but the thing is on Linux you use mostly OSS so there's almost no chance of malware, and if the malware slips into the code then there are alot of people looking at the source code continuously soo its very damm hard for malware to slip in but definitely possible
@ChristopherGray00
@ChristopherGray00 Жыл бұрын
this is a bogus argument, the reason there isn't much linux malware yet is because the desktop userbase is a small minority compared to windows, linux programs have the freedom and more to execute malware just as bad as windows, this is true for essentially all operating systems that allow execution of arbitrary non-approved code.
@computernerd8157
@computernerd8157 18 күн бұрын
This comment did not age well. I remember a bad actor compromised Linux Mint Distro. A Hacker modified the ISO and so he could create a Bot-Net. That would be much harder to do with closed sources software without a decompiler.
@Eddy-Cool
@Eddy-Cool Жыл бұрын
question: how did it work without sudo?
@alexmercer7550
@alexmercer7550 2 жыл бұрын
who the hell would download a random executable from a random place and purposefully execute it in terminal i understand that it can be included as a payload to some program but still you can get every possible program from your package manager, and or from source/official website
@mamalinio
@mamalinio 2 жыл бұрын
Its extremely difficult not to say nearly impossible this to be deployed on an enterprise server from experienced admins.
@Pujastanto
@Pujastanto 2 жыл бұрын
Unlike pcs, Servers are redundant unless all servers infected at once, what the server maintainers need to do is erase the infected one and use the backup, yeah it may slow down some server but it will be right back in minutes or maybe an hour or two, but if u are using linux as pc be careful though
@DarkGT
@DarkGT 2 жыл бұрын
Linux is as vulnerable as Windows if some user decide to run something unchecked from the Internet. But on Windows you get third-party anti malware products.
@melhadden5266
@melhadden5266 2 жыл бұрын
The third-party and anti malware products are subsidiaries of the virus propagators. You pay them ransom to infect other computers. No pay, they go away ...... Reformat your infected items and get on with your life. If you lost data, that's your fault for not backing it up.
@DarkGT
@DarkGT 2 жыл бұрын
You don't value your time my friend. You can't just reformat your problems away...
@exe_
@exe_ 2 жыл бұрын
always backup on different servers, take at least two sources to backup (all cloud drives together count as one and the files you use to actually work count as zero).
@MrAdi2500
@MrAdi2500 2 жыл бұрын
Yep. I know the 3-2-1 rule: 3 backups, two of them in the normal building but different servers and one anywhere else, at least in a different region at best in another country. And the rule: "No backup no tears for you"
@maxwellsmart3156
@maxwellsmart3156 2 жыл бұрын
What's the attack vector for this ransomware because one doesn't just download files and run them on a server, not even Windows, but much less likely on your production Linux server. Any system is vulnerable, castles, servers, it just depends if there are stringent security protocols. ELF stands for executable and linkable format, it replaced the older a.out format but there's not reason to use and extension, you only have to make it executable. Run readelf to find out about the file.
@SteveMacSticky
@SteveMacSticky 2 жыл бұрын
thanks for covering a proper OS like GNU Linux Ubuntu
@pnunezaguila
@pnunezaguila 2 жыл бұрын
The equivalent of double click in Windows is to use the terminal... I mean that will exclude 80% of windows users, if Windows required to use the terminal to do the same, to get infected.
@bobbybologna3029
@bobbybologna3029 2 жыл бұрын
nope. it's still double click on linux too lol
@alexcricles
@alexcricles 2 жыл бұрын
I think ransomware just attack closed-source operating-system (windows, mac, etc), how open-source operating system could be attacked too?
@xDarkWav
@xDarkWav 2 жыл бұрын
Well, some time ago I ran a public Minecraft server on Ubuntu 20.04 and after some time just found the entire server folder and desktop folder was deleted from the system with the console logs full of errors. I'm not 100% sure but it quite possibly was a remote code execution exploit in MC's server software or even the java runtime itself. Thankfully nothing of any value was on that machine, so I just wiped the SSD and reinstalled (no ubuntu anymore this time though). Now all my MC servers run isolated in their own, dedicated VMs in VirtualBox. I had to learn that that's necessary the hard way, I really didn't want to believe java was that horrible when it comes to security holes until then :/
@Sumire973
@Sumire973 2 жыл бұрын
Java programs are OS and hardware architecture agnostic, so any malware made in Java will affect your Minecraft installation wherever you are.
@oqocraft2661
@oqocraft2661 2 жыл бұрын
Do you still have the logs
@xDarkWav
@xDarkWav 2 жыл бұрын
@@oqocraft2661 unfortunately no, the logs were deleted and ofc backup logs don't contain the relevant information.
@ShazyShaze
@ShazyShaze 2 жыл бұрын
My security solution has always been just being poor. No one's gonna hit you if you've got nothing for then to steal
@igorthelight
@igorthelight 2 жыл бұрын
Well... You could still be infected my mailware and ransomware. Not targeted for you - just a random one.
@kiiiburn
@kiiiburn 2 жыл бұрын
For everyone saying, "don't run random executables" what do you say about RCE vulnerabilities for these types of things? Happens all the time.
@westlyward2504
@westlyward2504 2 жыл бұрын
I do acknowledge that there can be vulnerabilities that go undiscovered for years. The creator of this video makes it sound like what he does in the video is something that linux users do all the time. Although it may be moot point, I'd also like to note that I've seen many articles talking about these vulnerabilities, I don't remember, any of them saying that they had been exploited in the wild.
@GC-qe8vc
@GC-qe8vc 2 жыл бұрын
Well, this video was not an example of remote code execution. And no, it does not happen "all the time" in Linux. Don't mix up the discovery of a code vulnerability that could *potentially* be used for RCE and the creation of an actual exploit.
@atpray
@atpray 2 жыл бұрын
Linux is just an operating system like any other. Its just most of software used on linux are open source. Just don't execute any file or script or software from third party sources, unless they are your trusted sources. You always have your package manager to install all open source applications that you will ever need.
@CoolingTool
@CoolingTool 2 жыл бұрын
@Idk Gaming thats epic
@ab.md.faisalrahman3310
@ab.md.faisalrahman3310 2 жыл бұрын
why on earth a linux user would run a suspicious script without cat?
@igorthelight
@igorthelight 2 жыл бұрын
Good luck reading every *.ELF file ;-) That wasn't a BASH script in the video.
@Skeleton-wn2zu
@Skeleton-wn2zu 2 жыл бұрын
Just use btrfs to snapshot your system so you can backup your files and restore them if needed.
@kquote03
@kquote03 2 жыл бұрын
not practical since that will take a LOT of storage and most distros only backup / without backing up the home folder
@kquote03
@kquote03 2 жыл бұрын
@@szymex8341 yea I know, for system files it's alright, but for /home it takes way too much space.
@djdeetsdroppingthosefunkyb1236
@djdeetsdroppingthosefunkyb1236 2 жыл бұрын
@@kquote03 Takes 8gb on my setup...
@kquote03
@kquote03 2 жыл бұрын
@@djdeetsdroppingthosefunkyb1236 Things like "for how long your setup is running for" and "how many snapshots" obviously affect.
@kquote03
@kquote03 2 жыл бұрын
@Watcher I'll be honest. I agree. I guess my comment about it taking way too much space was just an isolated issue as I do work with many heavy files.
@rknill1
@rknill1 2 жыл бұрын
I maintain a windows partition and Linux partition on the same drive and periodically do a disk image backup using AOMEI standard edition. I do a weekly backup of the entire drive. I have on occasion restored the Linux partition with no problem. The windows partition is on the drive for gaming. The Linux Manjaro is for everything else.
2 жыл бұрын
about the people saying they stay secure only using packages from oficial distro... it is exactly the scenario where windows fails. A third user using a linux computer gets a mail with malware. This isn't rocket science. Just like with a properly run windows machine.
@linkxthatsme5141
@linkxthatsme5141 2 жыл бұрын
So they don't only happen in Windows XP
@joejavacavalier2001
@joejavacavalier2001 2 жыл бұрын
Besides, clamav, iptables to limit outside connections, only using software from the approved repositories, restricting ssh server access with RSA keys.... What else can you do?
@devnull6320
@devnull6320 2 жыл бұрын
Everything, you got the source code for the kernel. But you need to understand how things works, and thats a huge problem :D
@aleksic1234
@aleksic1234 2 жыл бұрын
Route everything through Tor
@jasoncravens1124
@jasoncravens1124 2 жыл бұрын
Look at the code first.
@joejavacavalier2001
@joejavacavalier2001 2 жыл бұрын
@@jasoncravens1124 The code to what? The kernel or all the GNU stuff I use on top of the kernel? Um, no
@jasoncravens1124
@jasoncravens1124 2 жыл бұрын
@@joejavacavalier2001 No, not everything, some bullshit suspect file. Like a .elf file that you have acquired "somewhere" and have intentionally marked executable (which he did , and didn't show you) and then manually run from a terminal. You may want to take a look at that first. Point is, you are on it. Because that is what you can do. This would never happen, not ever. What is this, your first day on a linux box? And I don't think it would happen then, either. This is very misleading.
@AgentFortySeven47
@AgentFortySeven47 Жыл бұрын
the average linux user is aware enough to use the distro package managers for their software and use trusted sites for the few programs that aren't in the package manager. i have fedora and the majority of packages that i need are in the fedora repos or fedora-adjacent repos (rpm fusion, for example)
@MoKhera
@MoKhera 2 жыл бұрын
All I can say is, I got hacked in May, though I was lucky enough to maintain personal cloud backups every week of my work and a lot of personal data. The overall experience was extremely unpleasant. Recommend using virtual machines without shared folders for anything you do outside of the norm. I was running an Arch distro. - Had to replace the router as that seemed to be the source of failed re-installations.
@laryfox7428
@laryfox7428 2 жыл бұрын
But I don't think it can affect files with different ownership(unless you run it as superuser)
@archygrey9093
@archygrey9093 2 жыл бұрын
Probably one of the biggest advantages to creating ransomeware or malware for linux is simply that most linux users are not going to expect it, and thus be less careful or skeptical.
@ShinobiDiabolik
@ShinobiDiabolik 2 жыл бұрын
Well actually, by the time of testing, the latest version is not 20.04 is 21.04 and 21.10 is behind the corner. 20.04 is the latest LTS - Long Term Support, but not the latest at all. 22.04 which comes after 20.10 will be the next LTS. Version 22.04 is the version i am targeting to migrate to. With this note out of the way, the video shows a very important note the video is actually showing a real threats that obviously works on Linux, and Linux is not unbreakable security, Linux is not un hackable. Where people say about this means that Linux does not suffer from Windows problems, but it has its own issues. This is important note we need to pay our attention to, and give it the attention is deserves.
@godnyx117
@godnyx117 2 жыл бұрын
Does running the script as regular user effects directories other than your home directory?
@genericgamer1319
@genericgamer1319 2 жыл бұрын
i don't think it can the same is true for windows if you can't access it the virus can't unless they get root & even so if SELinux is installed it adds security giving a process specific files/ports it can access/execute so even with root it can't do everything or at least that's how i understand things
@godnyx117
@godnyx117 2 жыл бұрын
@@genericgamer1319 Yeah that's what I though and why I call bullshit. If I'm not wrong, windows can silently get permission to execute software with "administrator" privileges and also most of the files doesn't need that anyway so they are less secure. So this guy tells use that a malware (which is really a regular program) can infect linux. No shit Sherlock!!!
@ildefonsogiron4034
@ildefonsogiron4034 2 жыл бұрын
@@godnyx117 You're right. Windows runs in user space, as opposed to Linux, and that's why, when user privileges escalate, programs can compromise the whole system, and not just user's environment.
@paulg3336
@paulg3336 2 жыл бұрын
If someone sent me an email and asked me to smash my storage drive with a hammer... I probably wouldn't do it. Why got to this trouble? The only person that would fall for this is obviously an idiot,so why not just ask him to run: rm -rf / in the terminal ? Or better still ask him to transfer the contents of his bank account to yours.
@jeschinstad
@jeschinstad 2 жыл бұрын
That doesn't work on Ubuntu. :)
@Codename1Alice8
@Codename1Alice8 2 жыл бұрын
How to protect my ubuntu system???
@refusist
@refusist 2 жыл бұрын
dont run crap you dont trust
@tablettablete186
@tablettablete186 2 жыл бұрын
AppArmor, Seccomps, Good DAC (Dicresionary Access Control) rules, SELinux, Capabilities...
@Astra3yt
@Astra3yt 2 жыл бұрын
@@refusist Which is basically kinda easy to do with package managers. Most of these attacks are targeted at organizations anyway, not at desktop users. That said, backups are always important.
@Zszywek
@Zszywek 2 жыл бұрын
@@tablettablete186 I would also add Firejail and, technically speaking, if you would run ransomware file in the --private mode you would probably not be encrypted as it creates the temporary directories just for the run file, although I'm not cofident enough to try it by myself :P
@Alipuree
@Alipuree 2 жыл бұрын
@@refusist Same for windows
@dread69420
@dread69420 2 жыл бұрын
Its much more difficult to get something like this to actually run and priv esc to cause system wide damage most of the time compared to Windows. A threat is a threat though for sure.
@ChristopherGray00
@ChristopherGray00 Жыл бұрын
i dont know why linux users are trying to pretend like its any harder to run malware on linux, it's not, stop trying to be disingenuous for sake of argument, linux has the ability to run code as dangerous and more than windows.
@littleghoost
@littleghoost 11 ай бұрын
Depending on the number of files, this is not that efficient. I think the best efficiency for ransomware is MTF table encryption of disk storage. If there are many files, the person can end the process before it is finished, not to mention that changing the file names makes it very clear what is happening and prompts quick action from the person to block encryption.
@Doofus171
@Doofus171 9 ай бұрын
Thats only possible if the Linux user is signed in with administrator rights. If the Linux user was signed in as a Standard User rights, it would never even be able to execute.
@nonetrix3066
@nonetrix3066 2 жыл бұрын
With the Steam deck coming out and Linux possibly getting more use outside of servers I imagine you will see more targeting desktop Linux systems. Security from obscurity works but doesn't last forever
@raandomplayer8589
@raandomplayer8589 Жыл бұрын
thank you for this video, i came from your coverage of ltt getting hacked
@SkyyySi
@SkyyySi 2 жыл бұрын
I think the main reason why is simply because most AVs don't support Linux at all, and if no one shares those files with them, there's no way they can add it to their database.
@stephentaylforth4731
@stephentaylforth4731 2 жыл бұрын
The golden days of security through obscurity are over.
@alinaqirizvi587
@alinaqirizvi587 2 жыл бұрын
20.04 is the latest LTS release, 21.04 is the latest release
@heavy0119
@heavy0119 2 жыл бұрын
And 21.10 is releasing in a little under 2 weeks
@adambrown3918
@adambrown3918 2 жыл бұрын
Great video! Recommendations on anti-malware for Linux?
@mihailmojsoski4202
@mihailmojsoski4202 2 жыл бұрын
Common sense
@rexempire3365
@rexempire3365 2 жыл бұрын
Just so you know, anti-malware software for linux typically only scans for windows malware.
@adambrown3918
@adambrown3918 2 жыл бұрын
@@rexempire3365 Thank you for the reply 😊👍. I'm just genuinely curious if anyone is using anything( other than clamscan antivirus ) to deal with malware on *nix pc's.
@KaranSingh-or7yy
@KaranSingh-or7yy 2 жыл бұрын
*Make video on android malware too like the Pegasus*
@Davidian1024
@Davidian1024 2 жыл бұрын
Only 218 files affected? Sounds like it was contained within the leo user account. Even the most minimal Ubuntu 20.04 install with a desktop environment will have far more files. This isn't that interesting.
@1HiddenSecret
@1HiddenSecret 2 жыл бұрын
luckily I use a typewriter and morse code for my internet....
@troyBORG
@troyBORG 2 жыл бұрын
Ubuntu 2004 LTS isn't technically the newest it's the long-term support release I believe there's a 2104 interim release. And 2110 is coming October 14, 2021...
@finoderi
@finoderi 2 жыл бұрын
There are too little concrete information and details in this video. How this file works, what or who made it executable etc.
@igorthelight
@igorthelight 2 жыл бұрын
Do you think you could know 100% about any virus? ;-) It's somewhere from the DarkWeb most likely.
@finoderi
@finoderi 2 жыл бұрын
@@igorthelight Do you even understand how new files on linux work.
@igorthelight
@igorthelight 2 жыл бұрын
@@finoderi You mean - who gave it +x permission? :-)
@mikehare7185
@mikehare7185 2 жыл бұрын
Couldn't I just undelete my files to get them back? Assuming I had plenty free space on my drive. Anyway I've never installed software from an untrusted source so I can't say I'm at all worried.
@2008mustapa
@2008mustapa 2 жыл бұрын
which normal Linux user, will open a terminal, change the permission to executable, and run it ??? lol
@implicitmatrix1312
@implicitmatrix1312 2 жыл бұрын
Someone who has to use proprietary software. There are a number of proprietary installers that I have used that are installed exclusively this way, almost always with mandatory root permissions as well.
@mikhail-khlashiknov
@mikhail-khlashiknov 2 жыл бұрын
Thank you for Saving my Windows 10
@josueyuman7990
@josueyuman7990 Жыл бұрын
This is a real treate, but with common sense, good security practices, and downloading from official sources this can be avoid in much cases
@Supervideo1491
@Supervideo1491 2 жыл бұрын
Thanks for the tip!
@SabiazothPsyche
@SabiazothPsyche 2 жыл бұрын
You would literally have to download a ransomware virus yourself in Linux. Unlike Windows, this is likely not to happen in Linux; especially, that most of Linux's apps come from its own repositories. In Windows, you don't even have to literally download a virus, it can automatically be put into it without your consent: that's not likely to happen in Linux.
@gonzalolog
@gonzalolog 2 жыл бұрын
Only if you're falling for scams and shady pages downloads, it's not like you would get any virus if you use your PC with common sense The example of the program from the video uses basic file system functions in order to fuck everything, it's not exploiting or anything, just a program that decided to use normal functions
@SabiazothPsyche
@SabiazothPsyche 2 жыл бұрын
@@gonzalolog 👌👍
@281cu6
@281cu6 2 жыл бұрын
That opinion is outdated by about 10 years. You're going to need to walk that statement back quite a bit. Your first statement about "literally have to download ransomware yourself" applies to both operating systems. The vast majority of ransomware events I've cleaned up have occurred because of someone opening an attachment in an email. They didn't literally download the malware themselves, they simply clicked on a file that was spear-phished to them. Furthermore, there is also zero-click threat vectors. These use exploits and require no interaction from the end user and this does happen to both. For example: I have seen an organization get ransomware on all their Windows servers and computers. They then attempted to use their back up and disaster recovery server (BDR) that was running a Linux distro, only to find that the threat actors had compromised this system via exploits as they were on the network. The minute the org attempted to access the backups, they literally watched all of them get deleted. We have to set up a dirty network and a clean network when we recover now for this reason. We NEVER access backups without setting up a clean network with computers that have hard drives that are brand new or reformatted. The dirty network is where we disconnect from the WAN and start disinfecting via swapping clean drives. It takes a lot longer to recover now for this reason because these RaaS organizations are as well funded and talented as APTs from governments. Thinking you're save because Linux on an infected LAN is what a pseudo techie hobbyist says. My advice is you don't bring this up in a job interview if you ever get into cybersecurity. There's also a reason we have to VLAN linux based IoT devices now, because these devices have crummy stripped down versions of linux with terrible security. These devices get hacked A LOT. After a threat actor gains a foothold, they then pivot from the linux based IoT devices laterally to Windows devices. Seriously, don't underestimate the abilities of these ransomware gangs, they will clean your precious linux's clock if they get onto your network. They target small businesses frequently because they are easy money. Most of us in 2022 consider Windows to be the more secure of the two because it has been exposed to so many threats for so long. We have tools now like Zero Trust Frameworks, application ringencing, next gen endpoint agents, larger security patching teams. Centrally managed and highly developed tools are not a thing yet for Linux (unless you work for a huge firm with tons of cash to buy enterprise grade tools). Easily accessible security tools are still in their infancy for Linux and it's way behind. I always laugh at these Mac (yes I know it's Unix) guys who say Macs can't get viruses, when I literally just had a notice from our SOC a few weeks ago that one of our Macs has malware on it. Great, I have an eye twitch now.
@SabiazothPsyche
@SabiazothPsyche 2 жыл бұрын
@@281cu6 Your statement has weight; however, never has my Being ever had its hard drive completely unusable by any Linux distro(s). However, in Windows, that problem has always almost occurred. By my own experience between the two, Linux has provided my system with a way better protection then Windows.
@281cu6
@281cu6 2 жыл бұрын
@@SabiazothPsyche With the advent of OS agnostic ransomware and the fact that it just requires a mouse click to deploy makes it an equal risk for end users on both OS's to be socially engineered, which is the vast majority of hacks. Windows with a proper GPOs, next gen AV, SIEM, MTR with a SOC, application whitelisting and ringfencing (even root or system access can't defeat [actually had to turn that off to allow a pentest to proceed]), makes it nearly impervious. Linux on the other hand doesn't have many of technologies mature enough and would then need enterprise dedicated network appliances off of he workstation to accomplish some of it. The minute REvil has a foothold in your LAN, you're done. Linux has privilege escalation and arbitrary code execution vulnerabilties coming up with high CVSS scores constantly these days, just like Windows. I am literally typing this out on my laptop running Mint. I am NOT a fan of Windows, but I had to set aside my bias and recognize times have changed.
@dominik2327
@dominik2327 2 жыл бұрын
One does not simply execute binaries downloaded from a website or received as an email attachment on Linux.
@igorthelight
@igorthelight 2 жыл бұрын
Same for smart Windows users ;-)
@technicallyme
@technicallyme 2 жыл бұрын
My nextcloud server on unbuntu server just got hit 😭. Fully patched system too
@lockout5731
@lockout5731 2 жыл бұрын
another good teacher to teach us anything good lol
@The_Penguin_City
@The_Penguin_City 2 жыл бұрын
The most important ransomware today is called Office 360.
@hectorj.romanp.
@hectorj.romanp. 2 жыл бұрын
Yeah, being the victim is worsened by the feeling of being stupid.
@igorthelight
@igorthelight 2 жыл бұрын
True ;-)
@linuxenthusiastgamer7189
@linuxenthusiastgamer7189 2 жыл бұрын
finally linux is getting ransomware support, but still not open source nvidia driver support.
@mdragonborn
@mdragonborn 2 жыл бұрын
Iv been infected by a koom ransomware I resetted my PC since there wasn't much on it but now some system things stop working like search bar and start menu I can't fix anything by the normal methods shown on yt or any information site
@igorthelight
@igorthelight 2 жыл бұрын
Just format your drive and install the system. If you don't know how - ask someone who knows ;-)
@mdragonborn
@mdragonborn 2 жыл бұрын
@@igorthelight hmm that was a problem 2 months ago and I already used diskpart to clean my drives multiple times now I'm running win 11 no issues
@somnathdas7595
@somnathdas7595 2 жыл бұрын
Are you mad? Why I am going to run such files. All I use packages from app repository. How much money Windows paid to you for making this video? Do positive for society not for a company.
@ArtflPhenix
@ArtflPhenix 2 жыл бұрын
Can we have MacOS ransomware next?
@jasoncravens1124
@jasoncravens1124 2 жыл бұрын
Same difference. Unix. With *nix (linux/unix) it's mostly the same as far as running software. Same terminal and everything.
@igorthelight
@igorthelight 2 жыл бұрын
@@jasoncravens1124 Mac is closer to FreeBSD if I'm not mistaken. Almost the same thing. Not exactly but close.
@hatit8074
@hatit8074 2 жыл бұрын
Well, I have been using redhat and debian based systems since 2 years. I think they are better compared to windows in these matters. Although there could be potential ransom, damage is isolated to specific user. So am not buying it. No offense sir. Good content. Thank you.
@DiegoValle392
@DiegoValle392 7 ай бұрын
that's why SELinux and AppArmor exist.
@bradeagle7297
@bradeagle7297 2 жыл бұрын
This isn't surprising at all. You wouldn't need elevated permissions to encrypt a file with any programming language, its all about the files you encrypt. Encrypting the "pictures" folder has no elevated permission hince the non sudo requirement.
@Davi-did
@Davi-did 2 жыл бұрын
The person or people who wrote this ransomware put in the readme file, "Whats Happen?" instead of "What's happened?" or "What's happening?" Do the language patterns indicate to anyone what country of origin they may have?
@nelsone.hernandez6654
@nelsone.hernandez6654 2 жыл бұрын
Not only Linux is being targeted, but also VMware ESXi is being targeted, most of the time using the same binaries.
@zzz13zzz17
@zzz13zzz17 2 жыл бұрын
Itr is a global unsolvable problem for every operating system - quota for processed files per userr and pper process. It is unsolvalble for decades. It looks not like a mistake it llooks like a predesigned 'feature'. It is so simple - make a limit of for example two written files per process. And ask a confitm if process want more files. It is so simple, and it llooks so difficult to realise
@sugar.066
@sugar.066 2 жыл бұрын
Wow
@zzz13zzz17
@zzz13zzz17 2 жыл бұрын
@@sugar.066 it is not a bug, it is feature (c). Default policy to kill any users process that writes more than two files will be enough. Kill any user process that makes more than one child process. Kill a process if it have more than two processes in its family chain. Do not allow mass operations. It is so simple.
Is Valorant Spyware?
8:15
The PC Security Channel
Рет қаралды 763 М.
Downloading and running the 100 Malware links
13:33
The PC Security Channel
Рет қаралды 182 М.
لااا! هذه البرتقالة مزعجة جدًا #قصير
00:15
One More Arabic
Рет қаралды 52 МЛН
WILL IT BURST?
00:31
Natan por Aí
Рет қаралды 25 МЛН
Is your PC hacked? RAM Forensics with Volatility
14:29
The PC Security Channel
Рет қаралды 907 М.
Should You Run Anti-Virus On Linux?
9:26
DistroTube
Рет қаралды 95 М.
Top 5 Most Dangerous Ransomware
13:12
The PC Security Channel
Рет қаралды 214 М.
The Anti-Virus Tier List
9:38
Chris Titus Tech
Рет қаралды 1,1 МЛН
The Malware that hacked Linus Tech Tips
10:13
The PC Security Channel
Рет қаралды 1,5 МЛН
Why Linux isn't more popular
13:41
Surfshark Academy
Рет қаралды 218 М.
Kaspersky vs 2000 Malware
12:42
The PC Security Channel
Рет қаралды 222 М.
Password Hacking in Kali Linux
24:22
John Hammond
Рет қаралды 785 М.
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 1,9 МЛН
Wubuntu - The Windows Themed Linux Distro You Shouldn't Use
27:40
Michael MJD
Рет қаралды 599 М.