CISA Advisories

732 Bytes to Root Every Linux Server 🐧 & North Korea's Sneaky Developer Traps 🕵️

Two stories this week that every developer and IT team should know about: a tiny script that hands attackers the keys to your Linux servers, and a sophisticated North Korean operation targeting developers through fake job interviews.

🐧 One Python Script, Root on Every Major Linux Distro

Security researchers have disclosed CVE-2026-31431, a critical flaw in the Linux kernel that lets any local user become root — the most powerful account on a system — using just a 732-byte Python script. The vulnerability lives deep in the kernel's cryptographic code and works by tricking the system into writing data into the wrong place in memory, eventually corrupting a trusted system file (su) in a way that executes attacker-controlled code the next time it's run.

What makes this especially alarming: the exact same script works on Ubuntu, Amazon Linux, Red Hat Enterprise Linux (RHEL), and SUSE — all without any modifications. That covers the overwhelming majority of Linux servers running in businesses and cloud environments worldwide. If you have Linux systems in your environment, patching should be a top priority right now. Your distro's security team has already issued fixes — the key action is making sure your systems get updated.

Read more →

🕵️ North Korean Hackers Are Posing as Tech Recruiters

A developer recently received what looked like a legitimate job interview invitation from a Web3 company called 0G Labs. The catch? The "interview" required them to clone a code repository and run it — and that repository was loaded with malware. The moment the code ran, it silently connected to a server controlled by attackers and began stealing environment variables, hostnames, and network information from the developer's machine.

This attack mirrors a well-documented North Korean hacking playbook called "Contagious Interview," where state-sponsored hackers impersonate recruiters to get developers to run malicious code under the guise of a coding challenge or technical assessment. The stolen data — API keys, credentials, internal hostnames — can be used to pivot into company systems or cryptocurrency wallets. Developers should be extremely cautious about running code from unknown sources, even when it arrives wrapped in a professional-looking job offer. Always use a disposable virtual machine for running unfamiliar code, and verify recruiter identities through official company channels before proceeding.

Read more →

Stay ahead of threats with GOCO Security at gocosecurity.com

Comments