Red Hat warns of security patch hoax for Linux users
A fake security e-mail is being sent out to users
Computerworld - Linux vendor Red Hat Inc. is warning customers about an e-mail hoax that urges them to download security patches that actually contain malicious payloads.
In a note to customers on its Web site, Red Hat said it "has been made aware that e-mails are circulating that pretend to come from the Red Hat Security Team. These e-mails tell users to download and install malicious updates. These Trojan updates contain malicious code designed to compromise the systems they are run on."
The company said that "official messages from the Red Hat security team are never sent unsolicited" and are always sent from the address firstname.lastname@example.org. All security messages are also digitally signed using GNU Privacy Guard security keys to prove their authenticity, the Raleigh, N.C.-based company said.
"All official updates for Red Hat products are digitally signed and should not be installed unless they are correctly signed and the signature is verified," the company said.
A spokesman for the company couldn't be reached for comment this morning.
One example of the hoax e-mail is dated Oct. 20 and claims that "Redhat [sic] found a vulnerability in fileutils (ls and mkdir), that could allow a remote attacker to execute arbitrary code with root privileges. Some of the affected linux distributions include RedHat 7.2, RedHat 7.3, RedHat 8.0, RedHat 9.0, Fedora CORE 1, Fedora CORE 2 and not only. It is known that *BSD and Solaris platforms are NOT affected."
The hoax e-mail claims that "the RedHat Security Team strongly advises you to immediately apply the fileutils-1.0.6 patch," which it calls a "critical-critical update."
The hoax e-mail also points the recipient to an alleged Security RedHat mirror Web site where the malicious download, 1.0.6.patch.tar.gz, can be obtained. "Again, please apply this patch as soon as possible or you risk your system and others' to be compromised," the hoax e-mail says.
Read more about Linux and Unix in Computerworld's Linux and Unix Topic Center.
- Maintain Less. Create More. Spend less on maintenance and spend more time creating with Red Hat Enterprise Linux. Read on to learn how Red Hat can help...
- Flying High on the Use of Red Hat Enterprise Linux Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analysis....
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Linux and Unix White Papers | Webcasts