Ubuntu – How (in)vulnerable would Ubuntu be to encryption ransomware

malware

Edit: This is different from the suggested duplicate. The suggested duplicate is about viruses and antivirus in general. This question is specifically about encryption ransomware, how it can run, and whether it will affect encrypted folders.

These days, malicious software seems to be infecting Windows computers, encrypting their data against their will, and asking for a Bitcoin ransom in exchange for the encryption key.

I suppose it may be unlikely that anyone would code ransomware for Linux, but let's say someone did:

In order for such a software to run "successfully" on an Ubuntu machine, would the user first have to run it and give the sudo password? Is such a threat conceivable on Ubuntu without the user doing this?

If the users files were already encrypted, would that protect against this? Could a ransomware program, if unwittingly installed by a user (who also confirmed with the sudo password), take even your pre-encrypted data hostage?

In general, how (in)vulnerable is Ubuntu to encryption ransomware, and how careless/unsavvy do the actions of a user have to be in order to actually have his or hers data taken hostage?

Best Answer

In order for such a software to run "successfully" on an Ubuntu machine, would the user first have to run it and give the sudo password?

No, I would assume the data is your personal data and "sudo" is needed for system files.

If the users files were already encrypted, would that protect against this?

No. Data is data. Encryption plays no part: the ransomware will lock the data itself

Could a ransomware program, if unwittingly installed by a user (who also confirmed with the sudo password), take even your pre-encrypted data hostage?

Yes. They would not be able to VIEW the data but that was not their intention. Nor is encryption in any way important: they lock your "container".

In general, how (in)vulnerable is Ubuntu to encryption ransomware, and how careless/unsavvy do the actions of a user have to be in order to actually have his or hers data taken hostage?

Someone first has to create a situation where you and many others are willing to download and install their software. That is a hurdle even virus software writers have not been able to take.

The whole idea of ransomware is to target as many users as possible in the shortest time frame possible.

As soon as 1 Linux user gets targeted and they actually get his/her data tainted all hell would break loose and within minutes all of us will get informed in some sort of way. Look at what happened when the OpenSSL bug appeared. In a matter of minutes all the IT websites had a story to tell. Same with the kernel bug that appeared 2 days ago. Everyone jumped on it. If it happens I do not see this happening to more than a few users. By then all of us got informed or if possible there will be a fix for the method they used (like a hole in the kernel or in a browser that they exploited).

Most of us use Ubuntu Software Center. How likely is it that this malware ends up in Ubuntu Software Center? Next we use PPAs. The information for those PPAs we get from sites like omg.ubuntu.co.uk or webupd8 or from trusted Ubuntu channels.

That is also the difference between Linux/Ubuntu and Windows: Windows users are told to download and install software from any website they can find it. We mostly do not do that. So the amount of crap you can download for Windows is several times higher than for any other operating system. Makes Windows an easier target.