Search
Galaxy M36 5G
Launching in
Days
0
Hrs
12
Min
8
Sec
55

Linux Distributions Vulnerable to Cyber-Attacks: Report

Advertisement
Linux Distributions Vulnerable to Cyber-Attacks: Report
Researchers from University of California-Riverside have identified a weakness in the Transmission Control Protocol (TCP) of all Linux operating systems that enables attackers to remotely hijack users' internet communications.

Such a weakness could be used to launch targeted attacks that track users' online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee by anonymity networks such as Tor.

To transfer information from one source to another, Linux and other operating systems use the Transmission Control Protocol (TCP) to package and send data, and the Internet Protocol (IP) to ensure the information gets to the correct destination.

When two people communicate by email, TCP assembles their message into a series of data packets, identified by unique sequence numbers, that are transmitted, received, and reassembled into the original message.

Those TCP sequence numbers are useful to attackers, but with almost four billion possible sequences, it is essentially impossible to identify the sequence number associated with any particular communication by chance.

The researchers led by Yue Cao, computer science graduate student, identified a subtle flaw in the Linux software that enables attackers to infer the TCP sequence numbers associated with a particular connection with no more information than the IP address of the communicating parties.

This means that given any two arbitrary machines on the internet, a remote blind attacker without being able to eavesdrop on the communication, can track users' online activity, terminate connections with others and inject false material into their communications.

The weakness can allow attackers to degrade the privacy of anonymity networks, such as Tor, by forcing the connections to route through certain relays, the authors stated.

The attack is fast and reliable, happens in less than a minute and has a success rate of about 90 percent.

The researchers alerted Linux about the vulnerability which resulted in patches applied to the latest Linux version.

The study was set to be presented at the USENIX Security Symposium in Austin, Texas, this week.

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Hijacking, Internet, Laptops, Linux, PC, Tor, Ubuntu
 
Show Full Article
Please wait...
Advertisement

Related Stories

Popular Mobile Brands
  1. Oppo Reno 14 Pro 5G Series Set to Launch in India on This Date
  2. Nothing Phone 3 Surfaces on Geekbench Ahead of Launch on July 1
  3. Samsung Smart Monitor M9 Launched Alongside Updated M8 and M7 Models
  4. Upcoming Phones in July: Samsung Galaxy Z Fold 7, OnePlus Nord 5, More
  5. Motorola Teases New Phone Launch in India; Could Be the Moto G96 5G
  6. Unihertz Titan 2 First Look: Modern BlackBerry with 5G?
  7. OnePlus Expands Its Pickup and Drop Service to More Cities in India
  1. The Wild Robot Now on Streaming on JioHotstar: A Heartfelt Tale of a Machine Finding Home in the Wild
  2. Final Destination: Bloodlines Now Available on Rent on Prime Video
  3. Barbara Walters: Tell Me Everything Available on JioHotstar: What You Need to Know About This American Documentary
  4. Oppo K13 Turbo Pro, K13 Turbo Launch Timeline, Colourways Leaked; Tipped to Get 1.5K Display, Dual Rear Cameras
  5. Pariwar Now Streaming on Amazon Prime Video: Everything You Need to Know
  6. Senua's Saga: Hellblade 2 Enhanced PS5 Release Date Announced, 60 FPS Performance Mode Confirmed
  7. Amazon’s Ring Introduces AI-Powered Video Descriptions, Sends Users Quick Updates About Their Homes
  8. Sony Bravia 5 Series 4K Mini LED TVs With Up to 85-Inch Screen Launched: Price in India, Features
  9. Gemini on Android Will Soon Connect to Apps Even If User Disables Activity Logs, Won’t Affect Privacy
  10. Qualcomm May Use Samsung Foundry to Produce Different Variants of Snapdragon Elite 2 SoC for Galaxy S26 Series
Gadgets 360 is available in
Download Our Apps
App Store App Store
Available in Hindi
App Store
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.
Trending Products »
Latest Tech News »