IBM i Global

IBM i 

A space for professionals working with IBM’s integrated OS for Power systems to exchange ideas, ask questions, and share expertise on topics like RPG and COBOL development, application modernization, open source integration, system administration, and business continuity.


#Power


#IBMi
#Power
 View Only
Expand all | Collapse all

Malware and IBM i. Can it really be infected?

  • 1.  Malware and IBM i. Can it really be infected?

    Posted 5 days ago
    Edited by Alejandro Lazzaro 15 hours ago

    Hi everyone, I hope you enjoy my first blog here, it's called Malware and IBM i and it all started with this question: Can the IBM i really be infected?
    Mostly because I thought that it couldn't be infected and that the IBM i was not vulnerable to a Win/Linux malware.

    Enjoy the blog below!
    Malware and IBM i



    -------------------------------------------


    ------------------------------
    Alejandro Lazzaro
    ------------------------------



  • 2.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago

    Hi Alejandro 

    Your question is an interesting one, and the answer really depends on your definition.   For example, if you are solely using classic IBM i "/QSYS.LIB" file structure, then there is a strong argument that IBM i is immune to such Malware.  

    But, if you use your IBM i on a network where you share files with devices running other, using functions like NetServer, RSYNC, etc, then you could turn your IBM i server into an infected host, even if the programs running on it were not affected.  If this were to happen, then other clients on the network could infect files stored on its IBM i  IFS file structure.

    Further, if you do not take care with the configuration of your IFS security, then it is possible that ransomware attacks may affect files stored in the IFS of an IBM i server.  An extreme example of this is that an IBM i has its root ('/') shared on Netserver with a guest user configured that has *ALLOBJ authority.   In such extremely poorly configured systems then the IBM i objects could be corrupted.

    But, it is not all bad news, far from it!  Whilst you need to spend some time configuring security on an IBM i server, it is (in my opinion) the most securable operating system in the world.  Not only is the operating system built with security in mind, but it is now easier than ever to secure using the Navigator for i interface.  Added to that, IBM i has a function call Authority Collection Services that answers the million-dollar question, "What security does a user actually need to do their job?"  Authority Collection Services comes with your IBM i by default and at no extra cost.

    IBM i also has other security functions built into its database to aid data protection and integrity; these include but are not limited to, Immutable Journals, Commitment control, Row Column Access Control and Temporal Tables. 

    Finally, IBM i has one more unique weapon to help you keep your system secure; these are called Exit Points. You can use this functionality to build an extra layer of security whose only limitation is your imagination. 

    In summary, no system is secure by default, not even IBM i but if you put some time in, you can make it as secure as you like.



    ------------------------------
    Cheers, Brad.
    Steve Bradshaw
    IBM Champion, Member of CEAC, TD of i-UG.co.uk and Friendly Techie at RowtonIT.com
    ------------------------------



  • 3.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago

    The point is that an IBM i today doesn't run anymore or has serious issues if you would corrupt the IFS (especially /QIBM directories).

    In combination with modern (and more common to hackers) access methods like SSH and profiles that have too much authority makes an IBM vulnerable as well.

    Being a rather small platform with a good QSYS file system gives us some spare time but if one would really target you I think it can be more dramatic than on Windows.



    ------------------------------
    Paul Nicolay
    ------------------------------



  • 4.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago

    Hi Paul,

    I think that you are right, I saw several customers suffering Ransomware attacks, and it was an ordeal for them.

    Have you had a chance to read the article I posted on the first comment?
    Any feedback would be greatly appreciated.

    Thanks!!!



    ------------------------------
    Alejandro Lazzaro
    ------------------------------



  • 5.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago

    I read your article and appreciate your effort to raise awareness around this topic (the Fortra plug made me smile 😊). That said, I felt you got a bit carried away when describing the webshell/Putty "exploits" - there are, after all, plenty of other methods that antivirus solutions won't catch either.

    That being said, IBM i - like any other system - can absolutely be compromised if not properly secured. And by opening it up to modern tools and programming languages, the level of expertise required to mitigate such risks only increases.



    ------------------------------
    Paul Nicolay
    ------------------------------



  • 6.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago

    Thanks a lot for reading! As I said, this is my first article and I'm never sure if anything I write is any good 😊

    "...there are, after all, plenty of other methods that antivirus solutions won't catch either." Yes, indeed, and this is scary. That's why you also need a perimetral defense solution or write your own exit programs, we are on a position where the IBM i is available to more people, that can rent an LPAR in the cloud and just play, something that you could not do some years ago, and that increases the risks.

    The thing about the Webshell is that I was convinced that it would not affect the IBM i, but seeing this piece of code being able to extract files and run commands without credentials was a bit crazy for me, I honestly was not expecting it. When I first saw those infections, I warned the customers as it was not the regular 20-year-old worm that I normally find, but that level of compromise was beyond my expectations.

    When you say Fortra plug, do you refer to the Antivirus?



    ------------------------------
    Alejandro Lazzaro
    ------------------------------



  • 7.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago

    The webshell is nothing more that an web application that runs in a certain user context... just like any other web application.

    You can as well write this as a CGI program in Apache, or even standalone in RPG with sockets so you don't even need a webserver.



    ------------------------------
    Paul Nicolay
    ------------------------------



  • 8.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago
    Edited by Alejandro Lazzaro 4 days ago

    Yes, I understand what you state about the webshell, the problem is that those Webshells work both on Linux and Windows and were written on languages that could work on most platforms. So, this is not about webshells per se, this is about the IBM i being on a situation where malware written for other platforms can run on IBM i, and that was not something commonly known. It was actually denied on articles.

    Even on the early years, you could also write a CL code that deleted important data for the user, the thing is that those CLs or RPGs could be insider threats, that always existed and they could qualify as Malware, but they were not something either easily portable or common. A Windows/Linux malware is something that is more widespread and someone bumping into an IBM i could use one of those to do bad things, without knowing RPG or what an IBM i is.

    And, as I state on the article, I've only started digging into this because I found infections on real customers thus the need to raise awareness.



    ------------------------------
    Alejandro Lazzaro
    ------------------------------



  • 9.  RE: Malware and IBM i. Can it really be infected?

    Posted 4 days ago

    Hi Steve, thanks a lot for you reply!
    That's some of the stuff that I discuss on the article linked on the message, but there's a point that you are missing, I always thought that the worst-case scenario on the IBM i, besides being hit by Ransomware (that does not run on the IBM i, just yet), was for it to become "an infected host", but I saw that it was no longer the case.

    I hope you have some time to take a look at the article and maybe provide me with some greatly appreciated feedback.

    Thanks!!!



    ------------------------------
    Alejandro Lazzaro
    ------------------------------



  • 10.  RE: Malware and IBM i. Can it really be infected?

    Posted yesterday

    Hi Alejandro,

    as Steve and the others already mentioned, IBM is (one of?) the most secure Operating systems you can buy on this planet if you configure and use it the right way.
    Like a fire door, none of this helps if you leave it open.
    Beside all the info about IFS it is very important that the IBM i community need to understand that they open that door each time, they make a npm install within Node.js which is running on IBM i since 2014 and is used more and more.
    They open that door when they make a pip install within Python - the same thing and so on.

    Don't misunderstand me - my Team and I we love Node.js and use a lot of Python but you need to be aware that you can easily install malware when you make one of these things. In the past weeks there were some vulnerabilities with npm packages again and if you don't care about these things and don't face that topic, you are in danger....

    But as Steve already said: "But, it is not all bad news" - there are also ways to face that and it is similar to the things already mentioned below and the "normal" way of handling that in other environments.

    What I tell everybody that wants to hear it - and even more those who don't want to hear it - thing twice when you decide about your critical backend Language or Framework.
    Modern RPG for example is much more secure than all the "modern" frameworks (why does anybody call Java modern?!? It is 30 years old.... ;-) ) if you configure your IBM i the right way.

    Hope that helps a little bit more and wish you all the best. Stay secure!



    ------------------------------
    Markus A. Litters
    CEO
    edvberatung.litters
    Pirmasens
    +49 1775488377
    ------------------------------



  • 11.  RE: Malware and IBM i. Can it really be infected?

    Posted yesterday

    Hi again,
    sorry - I missed that there was an article :-D - great work!!!



    ------------------------------
    Markus A. Litters
    CEO
    edvberatung.litters
    Pirmasens
    +49 1775488377
    ------------------------------



  • 12.  RE: Malware and IBM i. Can it really be infected?

    Posted 15 hours ago

    Thanks a lot, Markus!

    I've edited the first message it's easier to understand that there's an article. With english not being my mother tongue, and myself being in the spectrum, it's sometimes complicated to convey what I mean to say :)



    ------------------------------
    Alejandro Lazzaro
    ------------------------------