Security and FUD Leftovers
-
Linux Support Expands Cyber Spy Group's Arsenal [Ed: This does not describe an issue with Linux itself, only tries to associate it with something bad]
An infamous Chinese cyber-hacking team has extended its SysUpdate malware framework to target Linux systems.
-
Iron Tiger hackers create Linux version of their custom malware [Ed: But they rely on a GNU/Linux machine being compromised in the first place]
The APT27 hacking group, aka "Iron Tiger," has prepared a new Linux version of its SysUpdate custom remote access malware, allowing the Chinese cyberespionage group to target more services used in the enterprise.
-
SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics [Ed: Why did it not make headlines when it targeted Windows? And should it not be noted the issue isn't in Linux, whereas Windows has back doors?]
Cybersecurity company Trend Micro said it observed the equivalent Windows variant in June 2022, nearly one month after the command-and-control (C2) infrastructure was set up.
-
Security updates for Wednesday [LWN.net]
Security updates have been issued by Debian (multipath-tools and syslog-ng), Fedora (gnutls and guile-gnutls), Oracle (git, httpd, lua, openssl, php, python-setuptools, python3.9, sudo, tar, and vim), Red Hat (kpatch-patch), Scientific Linux (git), SUSE (compat-openssl098, glibc, openssl, postgresql13, python-Django, webkit2gtk3, and xterm), and Ubuntu (awstats, expat, firefox, gnutls28, lighttpd, php7.2, php7.4, php8.1, python-pip, and tar).
-
Security updates for Thursday [LWN.net]
Security updates have been issued by CentOS (git), Debian (spip), Fedora (epiphany), Mageia (binwalk, chromium-browser-stable, crmsh, emacs, libraw, libtiff, nodejs, pkgconf, tar, and vim), Oracle (kernel and systemd), SUSE (emacs, kernel, nrpe, and rubygem-activerecord-4_2), and Ubuntu (c-ares, git, postgresql-12, postgresql-14, and sox).