CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

A Stealthy Linux Malware Targeting Latin American Financial Sector

admin by admin
June 13, 2022
in Information Security
Share on FacebookShare on Twitter


Cybersecurity researchers have taken the wraps off what they call a “nearly-impossible-to-detect” Linux malware that could be weaponized to backdoor infected systems.

Dubbed Symbiote by threat intelligence firms BlackBerry and Intezer, the stealthy malware is so named for its ability to conceal itself within running processes and network traffic and drain a victim’s resources like a parasite.

The operators behind Symbiote are believed to have commenced development on the malware in November 2021, with the threat actor predominantly using it to target the financial sector in Latin America, including banks like Banco do Brasil and Caixa, based on the domain names used.

“Symbiote’s main objective is to capture credentials and to facilitate backdoor access to a victim’s machine,” researchers Joakim Kennedy and Ismael Valenzuela said in a report shared with The Hacker News. “What makes Symbiote different from other Linux malware is that it infects running processes rather than using a standalone executable file to inflict damage.”

CyberSecurity

It achieves this by leveraging a native Linux feature called LD_PRELOAD — a method previously employed by malware such as Pro-Ocean and Facefish — so as to be loaded by the dynamic linker into all running processes and infect the host.

Besides hiding its presence on the file system, Symbiote is also capable of cloaking its network traffic by making use of the extended Berkeley Packet Filter (eBPF) feature. This is carried out by injecting itself into an inspection software’s process and using BPF to filter out results that would uncover its activity.

Upon hijacking all running processes, Symbiote enables rootkit functionality to further hide evidence of its existence and provides a backdoor for the threat actor to log in to the machine and execute privileged commands. It has also been observed storing captured credentials encrypted in files masquerading as C header files.

CyberSecurity

This is not the first time a malware with similar capabilities has been spotted in the wild. In February 2014, ESET revealed a Linux backdoor called Ebury that’s built to steal OpenSSH credentials and maintain access to a compromised server.

Furthermore, the disclosure arrives nearly a month after details emerged about an evasive Linux-based passive implant called BPFDoor that loads a Berkeley Packet Filter (BPF) sniffer to monitor network traffic and initiate a bind shell while bypassing firewall protections.

“Since the malware operates as a user-land level rootkit, detecting an infection may be difficult,” the researchers concluded. “Network telemetry can be used to detect anomalous DNS requests and security tools such as AVs and EDRs should be statically linked to ensure they are not ‘infected’ by userland rootkits.”





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

When and where to use IAM permissions boundaries

Next Post

The value of the CIO as anthropologist with Jason “JJ” James

Related Posts

Information Security

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

by admin
June 25, 2022
Information Security

The secret gay history of the modern internet

by admin
June 25, 2022
Information Security

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

by admin
June 24, 2022
Information Security

ToddyCat claws at Asian governments

by admin
June 24, 2022
Information Security

NSO Confirms Pegasus Spyware Used by at least 5 European Countries

by admin
June 23, 2022
Next Post

The value of the CIO as anthropologist with Jason “JJ” James

Leave Comment

Recommended

Q&A with CIO Dustin Hufford, Part 1: Adopting an Agile Mindset & Flipping IT Governance

June 26, 2022

Inspirationalleadership ~ Future of CIO

June 26, 2022

Learn NIST Inside Out With 21 Hours of Training @ 86% OFF

June 25, 2022

The secret gay history of the modern internet

June 25, 2022

“We Need to Get Better”: How CIOs Are Working to Extract More Value from EHRs

June 25, 2022

Innerframeworkforblance

June 25, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.