6

I recently came across an article on the The Verge, which centers around the concept of commercial malware production and how it's used around the world. The article introduced me to a number of interesting (and worrisome) concepts such as "process hollowing", remote access to hardware that's hidden from the system/user etc..

While I have no reason to have similar worries mentioned in the article, working with IT issues and developing in Java, together with the recent major bugs (shellshock, heartbleed etc) and the ever increasing complexity of the malware makes me quite paranoid about the vulnerabilities of the systems I use and administer.

Whenever I notice a suspicious behaviour (such as unusual slowness, random wake from sleep, high cpu load while not actively running demanding software) I tend to check the running processes on my mac/*nix machines. I have so far not come across anything that caught my eye, but that doesn't mean there are no "hollow" processes.

Is there a way to investigate the an OSX or Linux system, to check whether or not there's hidden malware?

posdef
  • 161
  • 4

2 Answers2

2

You may find a forensic tool called unhide to be of interest!

http://www.unhide-forensics.info

unhide uses a variety of techniques to find (or unhide) hidden processes and TCP/UDP ports utilized by rootkits/LKMs (Loadable Kernel Modules). It supports both Linux/Unix & Windows...

More details on the techniques used can be found on the website:

http://www.unhide-forensics.info/?Linux

vaughank
  • 99
  • 4
0

not exactly.. Most Linuxes have a /proc/ folder which allows you to see various details about processes. one "could" make a simple map of binaries vs open files and manually add to this list up until you have a fairly definitive system profile of your machine. You could even hook this (with a report into a cron job to run every minute or few seconds. )

This would of course require you to understand what each process that is running actually does and what files it should be accessing. and will require some initial work

  1. to write said application
  2. to whitelist processes while the system is still learning.

you could also extend it to moniter network activity.

This way you would atleast know if you have been comprimised.

Damian Nikodem
  • 779
  • 4
  • 8