Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm really surprised they did a call to system() rather than just implement a tiny bytecode interpreter.

A bytecode interpreter that can call syscalls can be just a few hundred bytes of code, and means you can avoid calling system() (whose calls might be logged), and avoid calling mprotect to make code executable (also something likely to raise security red flags).

The only downside of a bytecode interpreter is the whole of the rest of your malware needs to be compiled to your custom bytecode to get the benefits, and you will take a pretty big performance hit. Unless you're streaming the users webcam, that probably isn't an issue tho.



XZ backdoor v2.0 is sure to have that now.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: