Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Looney Tunables Linux OS Exploit Is Anything But Amusing
Facebook   X   LinkedIn   Email

Looney Tunables Linux OS Exploit Is Anything But Amusing

December 4, 2023

There’s a comical name for a serious Linux OS security vulnerability called Looney Tunables. This latest vulnerability exploit leads to elevated privileges, a dangerous outcome. Like other operating systems, a Linux OS directly manages software, memory, storage, hardware, and other critical functions. So, when a vulnerability exploit like Looney Tunables targets the largest open-sourced OS in the world, it’s time for a closer look.

Looney Tunables executes using a backdoor vulnerability (CVE-2023-4911) allowing it to sidestep authentication procedures and enter a system. It creates a point of access for the attacker, in this case, the cloud threat group known as Money Libra. The group, also called Kinsing, is known for cryptojacking attacks via the cloud and using their Kinsing malware.

Looney Tunables = Privilege Escalation

In general, privilege escalation attacks like that of Looney Tunables involve exploiting a system weakness to get unauthorized privileges, in this case for Linux operating systems. Escalation allows access within systems, networks, and software. Several major Linux system distributions vulnerable to Looney Tunables escalated privileges include Red Hat, Gentoo, Ubuntu, and Debian.

In particular, Looney Tunables privilege escalation allows attackers like this group to leverage the vulnerability and gain root access privileges, the highest privilege on an operating system. Root privileges allow administrative control and unrestricted permissions to change OS settings.

Kinsing’s Deviant Deviation

Tracking by Aqua Security shows Kinsing exploited the Looney Tunables vulnerability using a different method of attack from their “business as usual.” Using a publicly available PoC (proof of concept) exploit to show software weakness information, they leveraged Looney Tunables for system root access. Downloading other scripts for backdoor access to the server, they gained credentials having to do with the Cloud Service Provider, or CSP.

According to Aqua Security, putting their focus on information gathering is a first for Kinsing threat group, who typically focus on spreading malware to run a cryptominer. This change, according to Aqua Security, could mean Kinsing could be “planning to do more varied and intense activities soon” and those activities could mean “…a bigger risk for systems and services that run on the cloud.”

To help avoid an exploit like Looney Tunables and others, always keep system software updated and patched as soon as they’re available. Be on the lookout because one of those updates will be a fix for the totally “unamusing” Looney Tunables.


AI Becomes Criminals' New Ally with the Emergence of FraudGPT

Your Security

AI Becomes Criminals' New Ally with the Emergence of FraudGPT

The digital landscape is facing a fresh threat: FraudGPT. This nefarious AI tool, hanging around at the backdoor of WormGPT, first popped up on July 22, 2023. Numerous underground websites and private Telegram channels were the first to notice its presence. What sets FraudGPT apart from other cyber threats is its versatility—it's a multi-purpose tool designed for an array of illicit activities. And once inside your computer, this software can wreak significant havoc. READ FULL STORY

Info-Stealing Families Increase Break-ins To Your Corporation

Corporate Security

Info-Stealing Families Increase Break-ins To Your Corporation

The analysis of approximately 20 million information-stealing malware logs has unveiled that infiltration of such threats into business environments is spiking rapidly. It’s not just one family of malware doing this either, but a whole bunch of them. There are places where cybercriminals can purchase information stolen by these families and use it against us. Fortunately, there are some ways everyone in the corporation can help mitigate this risk. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...