• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
ubuntu 'command not found' tool could trick users into installing rogue packages

Ubuntu ‘command-not-found’ Tool Could Trick Users into Installing Rogue Packages

You are here: Home / General Cyber Security News / Ubuntu ‘command-not-found’ Tool Could Trick Users into Installing Rogue Packages
February 14, 2024

Cybersecurity scientists have found that it is really possible for threat actors to exploit a very well-recognized utility termed command-not-discovered to recommend their very own rogue packages and compromise methods managing Ubuntu running technique.

“Even though ‘command-not-found’ serves as a practical instrument for suggesting installations for uninstalled instructions, it can be inadvertently manipulated by attackers through the snap repository, leading to deceptive recommendations of malicious offers,” cloud security organization Aqua mentioned in a report shared with The Hacker News.

Put in by default on Ubuntu programs, command-not-found implies offers to install in interactive bash periods when trying to operate instructions that are not obtainable. The solutions include things like equally the Highly developed Packaging Instrument (APT) and snap offers.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


When the tool works by using an inside database (“/var/lib/command-not-discovered/commands.db”) to propose APT packages, it depends on the “recommend-snap” command to counsel snaps that offer the supplied command.

Cybersecurity

Therefore, ought to an attacker be equipped to activity this system and have their malicious package recommended by the ‘command-not-found’ package, it could pave the way for application source chain attacks.

Aqua said it located a likely loophole whereby the alias mechanism can be exploited by the risk actor to possibly register the corresponding snap name connected with an alias and trick users into setting up the destructive bundle.

What is more, an attacker could assert the snap identify associated to an APT bundle and upload a destructive snap, which then ends up getting instructed when a consumer varieties in the command on their terminal.

Linux Rogue Packages
Linux Rogue Packages

“The maintainers of the ‘jupyter-notebook’ APT bundle had not claimed the corresponding snap name,” Aqua stated. “This oversight left a window of chance for an attacker to claim it and add a destructive snap named ‘jupyter-notebook.'”

To make matters worse, command-not-identified utility implies the snap package higher than the respectable APT package deal for jupyter-notebook, deceptive end users into putting in the phony snap package.

As many as 26% of the APT package commands are susceptible to impersonation by destructive actors, Aqua pointed out, presenting a sizeable security risk, as they could be registered below an attacker’s account.

A 3rd class entails typosquatting attacks in which typographical faults manufactured by end users (e.g., ifconfigg rather of ifconfig) are leveraged to propose bogus snap packages by registering a fraudulent bundle with the identify “ifconfigg.”

Cybersecurity

In these types of a scenario, command-not-identified “would mistakenly match it to this incorrect command and suggest the malicious snap, bypassing the suggestion for ‘net-tools’ entirely,” Aqua researchers spelled out.

Describing the abuse of the command-not-observed utility to endorse counterfeit deals as a urgent concern, the firm is urging end users to validate the supply of a bundle just before set up and look at the maintainers’ trustworthiness.

Developers of APT and snap offers have also been recommended to register the associated snap name for their commands to prevent them from currently being misused.

“It remains uncertain how extensively these capabilities have been exploited, underscoring the urgency for heightened vigilance and proactive defense strategies,” Aqua reported.

Identified this post interesting? Abide by us on Twitter  and LinkedIn to go through more exclusive articles we post.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «cybersecurity tactics finserv institutions can bank on in 2024 Cybersecurity Tactics FinServ Institutions Can Bank On in 2024
Next Post: Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyberattacks microsoft, openai warn of nation state hackers weaponizing ai for cyberattacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.