¥ê¥¹¥¯´ÉÍý¤ª¤è¤ÓÊݸ±´ØÏ¢´ë¶È¤ÎAon¤Ï¤³¤Î¤Û¤É¡¢¡ÖUnveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules¡×¤Ë¤ª¤¤¤Æ¡¢¿·¤·¤¤±Ê³²½¼êË¡¤òÍѤ¤¤ëLinux¸þ¤±¥Þ¥ë¥¦¥§¥¢¡Ösedexp¡×¤òȯ¸«¤·¤¿¤ÈÅÁ¤¨¤¿¡£¤³¤Î¥Þ¥ë¥¦¥§¥¢¤Ïudev¥ë¡¼¥ë¤ò°­ÍѤ¤¤Æ±Ê³À­¤ò³ÎÊݤ·¡¢¥á¥â¥ê¤òÁàºî¤·¤Æ¼«¿È¤ò±£Ê乤ë¤È¤µ¤ì¤ë¡£

Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules

¡ûudev¥ë¡¼¥ë¤Î°­ÍÑ

udev¤ÏLinux¤Î¥Ç¥Ð¥¤¥¹´ÉÍý¥Ä¡¼¥ë¤Ç¡¢¡Ö/dev¡×¥Ç¥£¥ì¥¯¥È¥ê¤ËÀ¸À®¤µ¤ì¤ë¥Ç¥Ð¥¤¥¹¥Õ¥¡¥¤¥ë¤ÎưŪ´ÉÍý¤òô¤¦¡£USB¥Ç¥Ð¥¤¥¹¤Ê¤É¤òÀܳ¤¹¤ë¤È¡¢udev¤ÏŬÀڤʥɥ饤¥Ð¡¼¤ò¥í¡¼¥É¤·¡¢É¬Íפʥ¢¥¯¥·¥ç¥ó¤ò¼Â¹Ô¤¹¤ë¡£

udev¤Ï¡¢¡Öudev¥ë¡¼¥ë¡×¤È¸Æ¤Ð¤ì¤ëÀßÄê¥Õ¥¡¥¤¥ë¤Ëµ­½Ò¤µ¤ì¤¿¥ë¡¼¥ë¤Ë½¾¤¤¥¢¥¯¥·¥ç¥ó¤ò¼Â¹Ô¤¹¤ë¡£º£²ó¹¶·â¼Ô¤¬±Ê³À­³ÎÊݤΤ¿¤á¤ËÄɲä·¤¿¥ë¡¼¥ë¤Ï¼¡¤Î¤È¤ª¤ê¡£

ACTION=="add", ENV{MAJOR}=="1", ENV{MINOR}=="8", RUN+="asedexpb run:+"

¤³¤Î¥ë¡¼¥ë¤òÍ×Ì󤹤ë¤È¡¢¡Ö¥é¥ó¥À¥à(random)¥Ç¥Ð¥¤¥¹Äɲûþ¤Ëasedexpb¤ò¼Â¹Ô¤»¤è¡×¤È¤Ê¤ë¡£¥é¥ó¥À¥à(random)¥Ç¥Ð¥¤¥¹¤Ï¥·¥¹¥Æ¥àµ¯Æ°»þ¤Ëɬ¤ºÄɲ䵤ì¤ë¤¿¤á¡¢¥Þ¥ë¥¦¥§¥¢¤âɬ¤º¼Â¹Ô¤µ¤ì¤ë¤³¤È¤Ë¤Ê¤ë¡£

¡û¥Þ¥ë¥¦¥§¥¢¡Ösedexp¡×¤Î¼ÂÂÎ

Aon¤ÎʬÀϤˤè¤ë¤È¡¢¥Þ¥ë¥¦¥§¥¢¡Ösedexp¡×¤Ï°Ê²¼¤Îµ¡Ç½¤òÈ÷¤¨¤Æ¤¤¤ë¤È¤¤¤¦¡£

¥ê¥Ð¡¼¥¹¥·¥§¥ë¤Ë¤è¤ë±ó³ÖÁàºî

¥á¥â¥êÁàºî¤Ë¤è¤ëʸ»úÎó¡Ösedexp¡×¤ò´Þ¤à¥Õ¥¡¥¤¥ë¤Î±£Êᣤ³¤Îµ¡Ç½¤Ë¤è¤êÄɲä·¤¿Apache¹½À®¥Õ¥¡¥¤¥ë¡¢Web¥·¥§¥ë¡¢udev¥ë¡¼¥ë¤òls¤äfind¥³¥Þ¥ó¥É¤«¤é±£Ê乤ë

¥Þ¥ë¥¦¥§¥¢¤Î¥×¥í¥»¥¹Ì¾¤òkdevtmpfs¤ËÊѹ¹¤¹¤ë

¡û±Æ¶Á¤ÈÂкö

Aon¤ÎÄ´ºº¤Ë¤è¤ë¤È¡¢¹¶·â¼Ô¤Ï¿¯³²¤·¤¿Web¥µ¡¼¥Ð¾å¤Ë¥¯¥ì¥¸¥Ã¥È¥«¡¼¥É¾ðÊó¤òÀà¼è¤¹¤ëWeb¥¹¥¯¥ì¥¤¥Ô¥ó¥°¥³¡¼¥É¤òÀßÃÖ¤·¤Æ¤¤¤¿¤È¤¤¤¦¡£¤³¤Î»ö¼Â¤«¤é¡¢¹¶·â¼Ô¤ÎÌÜŪ¤Ï·ÐºÑŪÍø±×¤È¸«¤é¤ì¤ë¡£

Aon¤Ï¡¢¤³¤Î¤è¤¦¤Ë¥¹¥Æ¥ë¥¹À­¤¬¹â¤¤¹¶·â¤ò²óÈò¤¹¤ë¤¿¤á¡¢´ë¶È¤äÁÈ¿¥¤ËÂФ·¡¢¸¡½Ðµ¡Ç½¤Î·Ñ³Ū¤Ê¸þ¾å¤ª¤è¤ÓÊñ³çŪ¤Ê¥»¥­¥å¥ê¥Æ¥£Âкö¤Î¼Â»Ü¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£¤Þ¤¿¡¢¿¯³²¤µ¤ì¤¿²ÄǽÀ­¤Î¤¢¤ë´ë¶È¤ËÂФ·¤Æ¤Ï¡¢¥Ç¥¸¥¿¥ë¥Õ¥©¥ì¥ó¥¸¥Ã¥¯¤È¥¤¥ó¥·¥Ç¥ó¥ÈÂбþ(DFIR: Digital Forensics and Incident Response)¤ò¥µ¥Ý¡¼¥È¤¹¤ë¥»¥­¥å¥ê¥Æ¥£´ë¶È¤ËÁêÃ̤¹¤ë¤³¤È¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£