Software

OS wars and Solaris

Solaris version 10With the delayed release of Longhorn and Novell’s recent announcement of Novell Linux, based on its earlier purchase of German Linux developer SuSE, the OS wars are reaching new heights.

One of the most praised and popular operating systems a couple of years ago, Solaris started to fade out of the scene when Sun became more interested in Linux than supporting its own OS. A real pity, since Solaris was a nicely designed modern operating system, had better security features than many other commercial solutions and benefited from coherent updates from its developers.

From this point of view, we salute Sun’s initiative to revive Solaris and freely distribute version 10 for x86 and SPARC machines, hence rejoining the OS wars with a fresh, new approach!

Of course, Solaris is no longer such a strong presence on the Unix OS market – Linux is getting better every day, has likely more ports than any other OS out there. Distributions such as Fedora Core 3 benefit from easy and straightforward updates with a mouse click. How will the new Solaris 10 work on today’s market cannot be guessed at this stage of the story.

Discovered in 2001, ‘Sadmind’ (aliases: SunOS/BoxPoison, Solaris/Sadmind.worm)is still the only known Solaris worm at the moment. You can find a description of Sadmind, in our Virus Encyclopedia.

OS wars and Solaris

Your email address will not be published. Required fields are marked *

 

Reports

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox