With the recent windows 10 EoL news, I was able to move my dad over to Linux mint. But he does a lot of finance stuff. Long ago, Linux had a belief that desktop Linux are not the primary target for crackers but I don’t believe that true anymore since it’s getting significantly popular lately like Europe government migration over to Linux and Libreoffice.

My question would be , given my dad is just as careful on Linux as he has been on windows, would it be fine to do finance like banking and trading (not the fastest kind )?

If not, what would be your distro of choice for that? Even browsers (I installed Firefox and Edge from Microsoft website deb file)

  • hendrik@palaver.p3x.de
    link
    fedilink
    English
    arrow-up
    15
    ·
    edit-2
    1 day ago

    Can I get some list or a reference to educate myself? As far as I know it still holds true. There’s rootkits, a lot of old stuff and exploits of webservers or embedded devices, supply chain attacks towards developers and the one day the Mint ISO file got compromised. But I’m completely unaware of desktop computer malware with high risk or actually spreading?! And the list on Wikipedia seems to confirm what i said…

    • rhabarba@feddit.org
      link
      fedilink
      arrow-up
      3
      arrow-down
      7
      ·
      1 day ago

      Okay, let’s assume for fun that there’s highly developed Linux malware that exclusively infects servers and leaves desktops alone. What exactly is a server? Is it a server as soon as a web server service is running? A DNS service? An SMTP service? Some of these are also included with Linux desktops.

      But that’s not the point. There’s no specific “Linux server malware”. There’s Linux malware. It targets the Linux kernel (current data point), not any web stuff.

      • hendrik@palaver.p3x.de
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        1 day ago

        For example it’s something that has an Apache webserver installed and that Apache is accessible from outside… So the Apache exploit can do something. Do you have both conditions met on your laptop/desktop computer? I’m pretty sure that won’t be the case, and that’s the difference here. And yes, that’s specific.

        • rhabarba@feddit.org
          link
          fedilink
          arrow-up
          1
          arrow-down
          4
          ·
          1 day ago

          Let me repeat my last paragraph, as you seem to have stopped reading after the first question mark:

          But that’s not the point. There’s no specific “Linux server malware”. There’s Linux malware.

          • hendrik@palaver.p3x.de
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            edit-2
            1 day ago

            You’re wrong. How would an Apache exploit “hack” your Steam or online banking app? That’s just not possible.

            How would something that exploits the default password on a router infect my machine with a different password?

            Malware uses specific attack vectors and specific vulnerabilities.

            • rhabarba@feddit.org
              link
              fedilink
              arrow-up
              1
              arrow-down
              5
              ·
              1 day ago

              Malware uses specific attack vectors and specific vulnerabilities.

              The “specific vulnerabilities” are usually in the Linux kernel, quite present on every single Linux system. Please follow the link I posted above. This is not about Apache or any other arbitrary user-facing software.

              • hendrik@palaver.p3x.de
                link
                fedilink
                English
                arrow-up
                4
                ·
                edit-2
                1 day ago

                Thanks for the link. But that’s not a vulnerability or malware. It’s academic research how to hide malicious syscalls. But it can’t infect anyone’s computer. And there isn’t any vulnerability to let it in.

                  • hendrik@palaver.p3x.de
                    link
                    fedilink
                    English
                    arrow-up
                    5
                    ·
                    edit-2
                    1 day ago

                    I’m sorry. Most I can find about “RingReaper” is that single blog post or people who rephrased it into their own articles. There seems to be zero information on how it spreads through the internet? And if anyone contracted RingReaper. And I can’t even discern how that’d get on someone’s computer unless they install it themselves (which is a form of malware, though not very pronounced on linux due to the distributions and central package repositories). There are no other methods highlighted in the post. And it can’t do privilege escalation either, just scan for other vulnerabilities. So is this a thing in reality and how can I find out? It seems like valid research to me, but I can’t see how it’s more than that… What I mean is, I can see how someone put the word “malware” in the title. But that in itself doesn’t really threaten my (or OP’s dad’s) computer.