viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
New ultra-stealthy Linux backdoor isn’t your everyday malware discovery
Technology

New ultra-stealthy Linux backdoor isn’t your everyday malware discovery

09/06/2022

Stylized illustration of binary code.

Researchers have unearthed a discovery that doesn’t occur all that often in the realm of malware: a mature, never-before-seen Linux backdoor that uses novel evasion techniques to conceal its presence on infected servers, in some cases even with a forensic investigation.

On Thursday, researchers from Intezer and The BlackBerry Threat Research & Intelligence Team said that the previously undetected backdoor combines high levels of access with the ability to scrub any sign of infection from the file system, system processes, and network traffic. Dubbed Symbiote, it targets financial institutions in Brazil and was first detected in November.

Researchers for Intezer and BlackBerry wrote:

What makes Symbiote different from other Linux malware that we usually come across, is that it needs to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes using LD_PRELOAD (T1574.006), and parasitically infects the machine. Once it has infected all the running processes, it provides the threat actor with rootkit functionality, the ability to harvest credentials, and remote access capability.

Advertisement

With the help of LD_PRELOAD, Symbiote will load before any other shared objects. That allows the malware to tamper with other library files loaded for an application. The image below shows a summary of all of the malware’s evasions techniques.

BPF in the image refers to the Berkeley Packet Filter, which allows people to conceal malicious network traffic on an infected machine.

“When an administrator starts any packet capture tool on the infected machine, BPF bytecode is injected into the kernel that defines which packets should be captured,” the researchers wrote. “In this process, Symbiote adds its bytecode first so it can filter out network traffic that it doesn’t want the packet-capturing software to see.”

One of the stealth techniques Symbiote uses is known as libc function hooking. But the malware also uses hooking in its role as a data-theft tool. “The credential harvesting is performed by hooking the libc read function,” the researchers wrote. “If an ssh or scp process is calling the function, it captures the credentials.”

So far, there’s no evidence of infections in the wild, only malware samples found online. It’s unlikely this malware is widely active at the moment, but with stealth this robust, how can we be sure?

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

The Elder Scrolls Online’s new trailer teases a return to Skyrim
Bethesda released a new trailer for The Elder Scrolls Online …

The Elder Scrolls Online’s new trailer teases a return to Skyrim

Android malware can factory-reset phones after draining bank accounts
Getty Images A banking-fraud trojan that has been targeting Android …

Android malware can factory-reset phones after draining bank accounts

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • 2020 will be a big year for online childcare — here are 7 startups to watch
    How to work during a pandemic
    01/03/2020
  • Why SMEs need a ‘Nightingale lender’ and how to build one fast
    Why SMEs need a ‘Nightingale lender’ and …
    16/04/2020
  • Fast & Furious: Crossroads lives video games a quarter-mile at a time
    HQ Trivia shuts down after acquisition falls …
    15/02/2020
  • Researchers claim masks muffle speech, but not enough to impede speech recognition
    MIT researchers say their AI model can …
    29/10/2020
  • Gridwise aggregates ride-sharing data to give cities mobility insights
    Gridwise aggregates ride-sharing data to give cities …
    28/02/2020

Popular Posts

  • 10 Shocking and Surprising Facts About the …
    25/06/2022 0
  • US college VPN credentials for sale on Russian crime forums, FBI says
    US college VPN credentials for sale on …
    27/05/2022 0
  • 10 Cheap Foods That Will Make You …
    28/05/2022 0
  • 10 Origin Stories of Favorite Classic Sitcoms …
    28/05/2022 0
  • Top 10 Historical Musicals That Aren’t “Hamilton” …
    29/05/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh