Linux Distributions Vulnerable to Cyber-Attacks: Report

Advertisement
By Indo-Asian News Service | Updated: 10 August 2016 18:21 IST
Researchers from University of California-Riverside have identified a weakness in the Transmission Control Protocol (TCP) of all Linux operating systems that enables attackers to remotely hijack users' internet communications.

Such a weakness could be used to launch targeted attacks that track users' online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee by anonymity networks such as Tor.

To transfer information from one source to another, Linux and other operating systems use the Transmission Control Protocol (TCP) to package and send data, and the Internet Protocol (IP) to ensure the information gets to the correct destination.

When two people communicate by email, TCP assembles their message into a series of data packets, identified by unique sequence numbers, that are transmitted, received, and reassembled into the original message.

Advertisement

Those TCP sequence numbers are useful to attackers, but with almost four billion possible sequences, it is essentially impossible to identify the sequence number associated with any particular communication by chance.

Advertisement

The researchers led by Yue Cao, computer science graduate student, identified a subtle flaw in the Linux software that enables attackers to infer the TCP sequence numbers associated with a particular connection with no more information than the IP address of the communicating parties.

This means that given any two arbitrary machines on the internet, a remote blind attacker without being able to eavesdrop on the communication, can track users' online activity, terminate connections with others and inject false material into their communications.

Advertisement

The weakness can allow attackers to degrade the privacy of anonymity networks, such as Tor, by forcing the connections to route through certain relays, the authors stated.

The attack is fast and reliable, happens in less than a minute and has a success rate of about 90 percent.

Advertisement

The researchers alerted Linux about the vulnerability which resulted in patches applied to the latest Linux version.

The study was set to be presented at the USENIX Security Symposium in Austin, Texas, this week.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Hijacking, Internet, Laptops, Linux, PC, Tor, Ubuntu
Advertisement

Related Stories

Popular Mobile Brands
  1. Xiaomi Pad 8 Launched in India With Snapdragon 8s Gen 4 SoC, 9,200mAh Battery
  2. OnePlus 15T White Colourway, Key Display Features Revealed
  3. Vivo T5x 5G Will Launch in India Next Week With These Features
  4. iQOO Z11 Teased With 165Hz Display, 9,020mAh Battery; China Launch Expected Soon
  5. New Leak Reveals Samsung Is Testing 12,000mAh and 18,000mAh Batteries
  6. Jupiter Ends Retrograde Motion in March 2026 Skywatching Event
  1. Jupiter Resumes Direct Motion This March as the Gas Giant Hits Peak Visibility for 2026 Skywatchers
  2. Samsung Testing 12,000mAh, 18,000mAh Batteries With Dual Cell and Triple Cell Designs, Leaked Reports Show
  3. OnePlus 15T White Colourway, Key Display Features Revealed as Company Opens Pre-Orders in China
  4. Microsoft Could Reportedly Price Next-Gen Xbox 'Project Helix' at $1,000 or More
  5. Ravam: Sound of Soul Streaming on AhaVideo: What You Need to Know About This New Horror Thriller
  6. Thailand Targets Crypto Mule Accounts Linked to Scams, Illegal Transfers as Authorities Freeze 10,000 Wallets
  7. Infinix GT 50 Pro 5G Real-Life Images Surface Online as Smartphone Arrives on BIS Database
  8. Microsoft’s New Copilot Cowork Can Take Actions and Autonomously Complete Tasks
  9. Mardaani 3 Set for OTT Release Soon: What You Need to Know About Shivani Shivaji Roy’s Return
  10. Lenovo Tab Plus Gen 2 Spotted in Leaked Renders That Point to Significant Design Overhaul
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.