http://www.welivesecurity.com/2017/01/0 ... ter-060117
A bit of digging (which was not provided in the article, sadly) reveals that the attack vector is spearphishing. This suggests that a careful person on a properly configured workstation won't be vulnerable. Also, nothing I have seen suggests that there is a privilege elevation exploit in use here, so a normally secured Linux workstation or server should not be vulnerable, unless it exposes a root-enabled interface to the internet.
Nonetheless, it would seem that one of the attacks this malware executes are against grub directly.
So, I did an ls -al on /dev/sd* in my workstation, and here is the result:
- Code: Select all
brw-rw-rw- 1 root root 8, 0 Jan 6 12:46 /dev/sda
brw-rw-rw- 1 root root 8, 1 Jan 6 12:46 /dev/sda1
brw-rw-rw- 1 root root 8, 16 Jan 6 12:46 /dev/sdb
brw-rw-rw- 1 root root 8, 17 Jan 6 12:46 /dev/sdb1
brw-rw-rw- 1 root root 8, 32 Jan 6 12:46 /dev/sdc
brw-rw-rw- 1 root root 8, 33 Jan 6 12:46 /dev/sdc1
brw-rw-rw- 1 root root 8, 34 Jan 6 12:46 /dev/sdc2
brw-rw-rw- 1 root root 8, 37 Jan 6 12:46 /dev/sdc5
brw-rw-rw- 1 root root 8, 48 Jan 6 12:46 /dev/sdd
brw-rw-rw- 1 root root 8, 49 Jan 6 12:46 /dev/sdd1
brw-rw-rw- 1 root root 8, 50 Jan 6 12:46 /dev/sdd2
brw-rw-rw- 1 root root 8, 53 Jan 6 12:46 /dev/sdd5
brw-rw-rw- 1 root root 8, 64 Jan 5 16:56 /dev/sde
brw-rw-rw- 1 root root 8, 80 Jan 6 12:46 /dev/sdf
brw-rw-rw- 1 root root 8, 81 Jan 6 12:46 /dev/sdf1
Thus, it seems that such an attack would be able to write to the MBR (or UEFI blocks) of any volume, working as any user.
So. My question is this: What happens if the volume permissions are changed to 644 rather than 666? I hesitate to try it on my workstation, and don't have anything else handy right now. Would this impact writes to drives by non-root users?
