▲ | A Study of Malware Prevention in Linux Distributions(arxiv.org) | ||||||||||||||||
61 points by belter 5 days ago | 10 comments | |||||||||||||||||
▲ | ATechGuy 5 days ago | parent | next [-] | ||||||||||||||||
> Our interviews identified only a single Linux distribution, Wolfi OS, that performs active malware scanning. Seems like several authors are affiliated with Chainguard that created Wolfi. | |||||||||||||||||
| |||||||||||||||||
▲ | ashishbijlani 5 days ago | parent | prev | next [-] | ||||||||||||||||
Good to see Packj[1] as one of the malware scanners used. 1. https://github.com/ossillate-inc/packj Packj detects malicious PyPI/NPM/Ruby/PHP/etc. dependencies using behavioral analysis. It uses static+dynamic code analysis to scan for indicators of compromise (e.g., spawning of shell, use of SSH keys, network communication, use of decode+eval, etc). It also checks for several metadata attributes to detect bad actors (e.g., typo squatting). | |||||||||||||||||
| |||||||||||||||||
▲ | SamuelAdams 5 days ago | parent | prev | next [-] | ||||||||||||||||
This study seems flawed. It references the Xz backdoor, but then talks about malware in Linux distribution packages? It would make more sense to study and interview package management systems like PyPy and Nuget instead. | |||||||||||||||||
| |||||||||||||||||
▲ | klysm 5 days ago | parent | prev [-] | ||||||||||||||||
This is just marketing fluff | |||||||||||||||||
|