Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Malware on IBM Power Systems: What You Need to Know
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Malware on IBM Power Systems: What You Need to Know

4 years ago Tripwire Guest Authors
Malware on IBM Power Systems: What You Need to Know

Malware – what are the threats?

Malware can come from and in a variety of attack vectors. Besides using ‘traditional’ methods of spreading malware, adversaries can leverage more sophisticated methods to turn your Power System into a ‘malware host’.

The key target is your data. Data is valuable, and organisations have paid at least $602 million to ransomware gangs in 2021.  If they are not stealing it to sell on the dark web (social security numbers, credit card numbers, names, and addresses) then it will be held for ransom… “Give us some $$$ if you want to have your data decrypted.”

Why bother?

A lot of organisations are subject to regulatory requirements, such as PCI-DSS, HIPAA, FISMA, Gramm-Leach-Bliley Act (GLBA), UK DPA and GDPR.  The penalties can be severe for any organisation “leaking” data.  A UK airline, for instance, was fined £20,000,000 by the Information Commissioners’ Office (ICO).

The average cost of a breach in 2021 was €3.9 million ($4.24 million), marking a 10% increase compared to 2020. In the case of breaches, time is money and on average it takes 287 days to identify, close and remediate a data breach.

Power systems can’t be infected, right?

Because an Intel (x86)-architected virus cannot execute on IBM i, AIX, RHEL, or CentOS Operating systems running on IBM’s Power Chipset, we run the risk of misreading this as “no viruses are possible!” IBM has never claimed that the IBM i IFS was immune, as evidenced by the fact that the IBM i acquired integrated anti-virus protections in V5R3 in 2004.

However, that doesn’t stop malware from being stored.  All these Power OS’s can share disk space.  The IBM i uses its Integrated File System (IFS) to allow NetServer shares – which enables Windows desktop users to access the IBM i IFS through a mapped drive. AIX and Linux allow Networked File Systems (NFS) which permit the same thing, that is, the ability to access the file system through a mapped drive.  This means that if an Intel virus is copied to the mapped drive of the target system, then it will quite happily hide there without being detected by any antivirus software on the source system. 

This then makes your Power System like an asymptomatic ‘carrier’.  There are no symptoms on the ‘host’ OS, but it can reinfect your Windows machines if the user clicks on the file or object in the file share from their Windows desktop.

More recently, 35% of all new malware being written is targeted at Linux, the predominant OS of cloud services, which means this can be executed and is a real threat. However, this is not a new problem.  In 2014 a massive botnet of 25,000 compromised Linux servers was found using a mixture of malware (Ebury and Cdorked to name but two) to redirect web-traffic and send out spam.

How to combat this?

There are some simple steps you can take to combat this.

Known admin accounts

Disable known admin accounts, such as QSECOFR and root. Prevent them from logging in. Get some Privileged Access Management (PAM) software or implement sudo for *NIX servers. Don’t use obvious usernames like ‘JSMITH’ and work on the principle of least privilege for everyone, including your sysadmins!

Shutdown and remove unnecessary services

There are a multitude of services that are still shipped with IBM I, AIX and Linux that are inherently insecure and there are three that are common to all platforms. If you have TFTP, FTP or TELNET running, implement SSH and then shut them down and remove them.

Tighten the configuration of remaining services

If you are running SSH, NFS, Apache server, etc. ensure you are following best practices and standards such as the ones developed by the non-profit Centre for Internet Security (CIS). Monitor your configuration to ensure it has not changed from a set ‘benchmark’ as badly configured databases and http servers are common entry points for data breaches.

Define a strong password policy

Reuse options, distinctions between old and new passwords, and password length are all excellent practices, but it’s even better to start employing “pass phrases” that cannot be broken using brute force dictionary attacks. Even better, begin utilizing an SSH key that only permits access to a system upon exchange of a key that is encrypted. Consider two-factor or multi-factor authentication as an additional, difficult-to-crack security layer.

User accounts

Keep in mind that 61 percent of breaches are caused by compromised credentials, so you should frequently evaluate your user accounts and lock those that have been inactive for an extended period. A check of owned objects should also be performed, as production code and files should not be held by individuals, but rather by groups or maintenance accounts.

Patching

The era of “don’t fix it if it’s not broken” is over! Daily, new vulnerabilities are discovered, thus you should adhere to a regular patching plan.

Backups and Disaster Recovery

54 percent of organizations recovering from a ransomware attack employed reinstallation and backup restoration to resolve the issue, whereas 23 percent of organizations having a Disaster Recovery plan do not test it.

It’s worth remembering that the core reason for having a disaster recovery plan and testing it regularly, is to arm you and your team with the confidence that digital continuity can be provided, minimizing disruption to the business. Regular testing proves the plan and ensures that agreed recovery points and times continue to be achievable.

Hire and retain top talent

It might seem obvious, but treat your staff well. Threat actors and criminal groups are actively recruiting disgruntled employees to provide access into systems and networks. The LAPSUS$ ransomware group even posted a ‘job advert’!

Concluding thoughts

We can all do our bit.  Don’t pay ransoms. It is far better to avert a ransomware attack by hardening your attack surfaces than to have to deal with the aftermath. Power Systems, like the IBM i and AIX can’t be infected, but they can act as hosts.  RHEL and SUSE can be compromised and run malware.  Protect your Power systems with native antivirus software to catch malware at the source.


About the Author: Mike Davison has worked on IBM equipment in IT Operations since starting on the 4381 running VM/VSE as a trainee Operator in 1987.  He’s worked for blue-chip companies in global data centres and has a varied 30+ years’ experience of IBMi, AIX, VIOS, UNIX, Linux, storage and disaster recovery. Currently a Senior Technical Consultant for Helpsystems, Mikes main role is to provide consultancy and support for customers seeking to secure, monitor and automate their Power system operations.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Malware on IBM Power Systems: What You Need to Know” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Cloud, Compliance, Encryption, Finance, Linux, Malware, Medium Severity, Ransomware, TripWire

Continue Reading

Previous LibreOffice Releases Software Update to Patch 3 New Vulnerabilities
Next Auto-launching HiddAd on Google Play Store found in more than 6 million downloads

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

4 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

7 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

12 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

23 hours ago [email protected] (The Hacker News)

Recent Posts

  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control
  • Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
  • Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT