OS wars and Solaris

Solaris version 10With the delayed release of Longhorn and Novell’s recent announcement of Novell Linux, based on its earlier purchase of German Linux developer SuSE, the OS wars are reaching new heights.

One of the most praised and popular operating systems a couple of years ago, Solaris started to fade out of the scene when Sun became more interested in Linux than supporting its own OS. A real pity, since Solaris was a nicely designed modern operating system, had better security features than many other commercial solutions and benefited from coherent updates from its developers.

From this point of view, we salute Sun’s initiative to revive Solaris and freely distribute version 10 for x86 and SPARC machines, hence rejoining the OS wars with a fresh, new approach!

Of course, Solaris is no longer such a strong presence on the Unix OS market – Linux is getting better every day, has likely more ports than any other OS out there. Distributions such as Fedora Core 3 benefit from easy and straightforward updates with a mouse click. How will the new Solaris 10 work on today’s market cannot be guessed at this stage of the story.

Discovered in 2001, ‘Sadmind’ (aliases: SunOS/BoxPoison, Solaris/Sadmind.worm)is still the only known Solaris worm at the moment. You can find a description of Sadmind, in our Virus Encyclopedia.

OS wars and Solaris

Your email address will not be published. Required fields are marked *



Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox