US
27 MIN READ TIME

COMBAT MALWARE!

Jonni Bidwell wants to turn the tide on ransomware in 2022. It appears he has his work cut out for him…

T hese days we’re never far from cybercrime-themed headlines. What was very much in the realms of sci-fi a couple of decades ago has become almost commonplace today.

In the past few years we’ve seen largescale attacks against Ukraine’s power grid, Sony Pictures, the Colonial Oil Pipeline, JBL-SA( the world’s largest meat supplier) and South African shipping firm Transnet. Such attacks often aim to cause damage and disruption (the power grid attack left hundreds of thousands without power for hours). And sometimes the aim is political. For example, the Sony Pictures hack is widely believed to have originated from North Korea, with hackers demanding The Interview (a Kim Jong Un-themed comedy) be withdrawn.

Which it was, although not before gigabytes of embarrassing emails and personal information on Sony Pictures staff was shared.

Latterly though, hackers are financially motivated. They want their targets to pay (usually in cryptocurrency), either to restore access to their systems, or to avoid sensitive information being publicised. The last three attacks mentioned above all occurred in 2021, and are examples of such ransomware attacks. Ransom demands can be high too: the Colonial Pipeline hackers received $10 million (most of which was recovered), and prolific (but now defunct) ransomware outfit REvil requested $70 million following a supply chain attack on managed software company Kaseya.

Thanks to the ease with which fiat currency could be exchanged for Bitcoin, ransomware attacks launched against home users have proven profitable, too.

The tired old line “Linux doesn’t get viruses” (or ransomware, or whatever other kind of badware you might care to name) was never really true. Internetfacing Linux servers have long been a target for all kinds of mischief, and with so many Linux-powered Internet of Things devices joining the party, such intrusions are only going to increase.

Directed attacks against home users are waning, primarily because there are much more lucrative targets out there, but that’s no excuse for complacency.

We’ll show you the modern threatscape, refresh some best practices and hopefully get your 2022 off to the safest start possible. So let’s get to it!

Ransomware’s evolving

It’s bad and it’s getting worse. But running outdated versions of Windows doesn’t help anyone.

A few years back guilt-ware attacks were common. Unsuspecting users would log into their machines and be greeted with a banner stating they were under investigation for nebulous crimes. Anything from to piracy, to pornography or promulgation of terror materials. But don’t worry, says the warning – all of this will go away if you just wire some cryptocoins to this address.

The message goes on to explain how to acquire said coins, and warns that if you don’t pay, you’ll be arrested. That these kinds of attacks were ever successful (and sometimes still are) speaks volumes about people’s gullibility. It also shows some people have some quite funky ideas about how justice works. Yet we shouldn’t be so dismissive – there’s some psychology behind this.

The UK’s National Cyber Security Centre (NCSC) has some good high-level advice for home users seeking to avoid ransomware.

There’s a widely held theory that everyone has some latent guilt about something they’ve done in the past and not ‘fessed up to. And tapping into this with a scary message can make the subject feel rumbled. Detectives take advantage of this (and all kinds of other techniques) when questioning suspects.

Still, it’s the kind of message that lots of people (especially anyone used to browsing the internet without a pop-up blocker), will just close and ignore. So later evolutions of this attack would go a stage further, either locking the victim out of the machine entirely (forcing the user to choose between a complete reinstall or a quick ransom payment) or encrypting any user documents it finds. This is what ransomware typically refers to today. Thanks to networking (and a rich underground scene in the trade of network exploits) damage may quickly spread to other machines too, and before you know it a stray click on a single machine might bring about a network-wide incident.

Naturally, businesses are a much more lucrative target with (according to Coveware) the average payout in 2020 being $233,817. Attacks on home users might ask for anywhere between the equivalent of $200 to $2,000, which is why they don’t tend to grab the headlines anymore. Home users may also feel uncomfortable about reporting a ransomware attack, but they shouldn’t. Even if the authorities can’t help, reporting the incident (to the likes of CISA in the US or the NCA in the UK) will at least help them measure the scale of the threat. For businesses, the projected cost of recovery might well exceed the ransom, at which point it makes business sense to cough up. Insurers are starting to recognise this now and some (controversially) even include ransomware payments in their policies.

Unlock this article and much more with
You can enjoy:
Enjoy this edition in full
Instant access to 600+ titles
Thousands of back issues
No contract or commitment
Try for 99c
SUBSCRIBE NOW
30 day trial, then just $9.99 / month. Cancel anytime. New subscribers only.


Learn more
Pocketmags Plus
Pocketmags Plus

This article is from...


View Issues
Linux Format
February 2022
VIEW IN STORE

Other Articles in this Issue


WELCOME
MEET THE TEAM
This issue Jonni’s being paranoid about malware. We wondered what’s the most paranoid thing you find yourself doing?
Threatscape Linux
If you weren’t taking your security seriously before,
REGULARS AT A GLANCE
German state to replace MS Office with LibreOffice
The switch will see 25,000 PCs move to open source software
Blender 3.0 released
Open-source 3D graphics tool receives major update
Man-uses-Linux fallout
After the well-publicised travails of a YouTuber trying to use Linux, the community bands together to help out
WHAT TO DO IN 2022
Matt Yonkovit Head of open source strategy and
ALARMING STUFF
Keith Edmunds is MD of Tiger Computing Ltd,
Proton: now even better!
Playing Windows games in Linux receives a big boost
Firefox sandboxing explained
Firefox 95 will come with RLBox to help boost security
Open 3D Engine now available
Open-source 3D engine will boost Linux game dev-work
Distro watch
What’s down the side of the free software sofa?
VENUS AND VULKAN
Antonio Caggiano is a software engineer based at
NEW AND IMPROVED
Jon Masters has been involved with Linux for
KERNEL WATCH
Jon Masters summarises the latest happenings in the Linux kernel, because someone has to
Answers
Got a burning question about open source or the kernel? Whatever your level, email it to lxf.answers@futurenet.com
Mailserver
A diagram can save a thousand words, but
Alexander Tolstoy
is still zooming in and out his newly
FSearch
Version: 0.1 Web: https://github . com/cboxdoerfer/fsearch
Mapscii
Version: GIT Web: https://github.com/ rastapasta/mapscii
Telegrand
Version: GIT Web: https://github.com/ melix99/telegrand
Girouette
Version: 0.6.5 Web: https://github . com/gourlaysama/girouette
Sysmontask
Version: 1.0 Web: https://github.com/ KrispyCamel4u/SysMonTask
Luna Paint
Version: 0.11 Web: https://github.com/ lunapaint/vscode-luna-paint
AppImageLauncher
Version: 2.2.0 Web: https://github . com/TheAssassin/AppImageLauncher
Plop
Version: GIT Web: https://github.com/ Caltrop256/plop
Let’s Surf
Version: GIT Web: https://github.com/ jackbuehner/MicrosoftEdge-S.U.R.F
QOI
Version: GIT Web: https://github.com/ phoboslab/qoi
Xplorer
Version: 0.2 Web: https://github.com/ kimlimjustin/xplorer
DON’T TRUST YOUR VPN!
We lift the veil on the VPN world with the do’s and don’ts of what you should trust them with
REVIEWS
Easyspace web hosting
Mike Williams assesses a skilled UK host famous for its speed…
Intel Core i5 12600K
This is the best processor of 2022 so far for tech lovers and early adopters says Jacob Ridley, who’s looking forward to see what else the year will bring
Endless OS 4.0
Five minutes with the latest version of this distro and Mayank Sharma is reminded of the old adage: “The whole is greater than the sum of its parts.”
4MLinux 38.0
Any distro that’s survived for over a decade must be doing something right, but Mayank Sharma wasn’t prepared for what he saw inside this one…
Calculate Linux 22
Jonni Bidwell was dubious about making Gentoo easy, but after careful calculation of this KDE Edition he’s all for the idea…
Stellaris
Management hates anyone going anywhere, boldly or otherwise, so Phil Savage is in a space pickle as he’s only gone and taken over the galaxy
ROUNDUP
GUI backup tools
WE COMPARE GUI backup TONS OF tools STUFF SO YOU DON’T HAVE TO!
The Verdict
GUI backup tools
TOP OF THE FOSS
CLOUD SOVEREIGNTY
Jonni Bidwell reveals how Nextcloud has become the poster-child not just for self-hosting, but for how to be a sustainable, successful FOSS project
Pi USER
Raspberry Pi Trading seeks stock flotation
Looking to boost investment, an initial public offering would inject up to $500 million into the business
Display HAT Mini
Les Pounder thinks that Pimoroni’s latest display was designed for ants, or at least younger people with better eyesight than him
Build an embedded temperature sensor
Les Pounder is feeling the chill this winter, but just how cold is it in his workshop and should he invest in a woolly hat, complete with pom-pom?
Booting multiple operating systems
Christian Cawley examines the various ways you can boot your Raspberry Pi, from installing an OS to multibooting
IN-DEPTH
THE GUIX SYSTEM
Guix takes a novel approach to its package management. Mats Tage Axelsson guides you around it
TUTORIALS
Graphing disk usage
Shashank Sharma is a fount of knowledge and knows how to present the information. Which is why he appreciates tools that display data clearly…
Store your vital passwords securely
Nick Peers takes a close look at Swifty, an offline password manager with a slick interface and hopefully bright future
Emulating the Commodore VIC-20
Les Pounder takes a trip back to the 1980s to discover which computer Captain Kirk was using when he wasn’t at the helm of the USS Enterprise
Recreate electronic rock music effects
Fancy following in the footsteps of Hendrix or Clapton? Mike Bedford shows you how to add 70s-style electronic effects to your music tracks
Build an advanced networking test lab
Stuart Burns brings us up to date on his networking insights and covers expanding the networked virtual lab beyond the single host
Build a self-hosted Fediverse server
Big Social has you, monitoring 24 hours a day all year round. Learn how David Rut land breaks free into his own self-run Fediverse echo-chamber
How to set up a pro-level music studio
Michael Reed digs deeper into what’s possible in the realm of a Linux-based music studio, and discovers that the sky’s the limit
CODING ACADEMY
Get the most from the Gin HTTP framework
Discover how you can write secure and powerful HTTP-based services with the help of Mihalis Tsoukalos, a bit of Go and the Gin framework
Lag is killing games
Tim Armstrong shows off Latency.GG , an open-source global internet measurement system for reducing lag and jitter in multiplayer games
Chat
X
Pocketmags Support