Hackers hijack systems using Proot isolated file systems

No, that is not awesome, and the journey of never ending patching continues... :dead:
 
This might explain why all of my systems suddenly tir binutils updates?

Patches to those packages are somewhat rare.
 
The hackers already had root privileges before the hypothetical attack scenario presented in the article. The use of the utility was nothing more than a convenience.
 
Last edited:
The hackers already had root privileges before the hypothetical attack scenario presented in the article. The use of the utility was nothing more than a convenience.
I’m not sure the attack does need root, much of the utilities out there seem self contained and executable at the user level.
The bigger deal stems from the fact it is platform agnostic, self contained and updatable via Dropbox, GoogleDrive, etc… so it is a fire and forget solution.
 
No, that is not awesome, and the journey of never ending patching continues... :dead:

As noted above, system already has to be comprimised, so your already hosed before this tool even gets installed.
The abuse of PRoot by hackers makes these post-exploitation attacks platform and distribution-agnostic, increasing the chances of success and the threat actors' stealthiness.
 
Back
Top