• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

High-performance computing malware targeting Linux, Solaris and possibly Microsoft

You are here: Home / General Cyber Security News / High-performance computing malware targeting Linux, Solaris and possibly Microsoft

Freshly discovered malware is focusing on various platforms of superior-performance computing and other significant profile systems.

ESET named the malware it discovered “Kobalos” just after a mythologic, small, Greek trickster creature because of to its little code dimension packing outsized complexity.

Nevertheless at first described to a Linux malware procedure, the ESET group uncovered Kobalos on a assortment of platforms, stated Marc-Étienne Léveillé, a senior malware researcher at the vendor.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“We’ve also found it in Solaris and there are symptoms it may perhaps be in some Windows systems as perfectly,” he claimed.

Kobalos has an SSH credential harvester and really generic backdoor – so generic that ESET hasn’t been able to figure out the motives of the attacker. It’s unclear if the aim has been to just take benefit of the computing electricity, steal facts or regardless of what else.

The attacks have been spread out amongst the U.S., Europe, and Asia, and have bundled HPC clusters as well as college systems, a significant internet services company, particular units, and marketing and hosting companies.

Léveillé said that it’s abnormal to see cross platform attacks on HPC targets, nevertheless with a codebase that doesn’t use any running technique-precise commands, it would not be way too tricky to port from a person technique to an additional.

“It’s pretty smaller and extremely nicely crafted,” he mentioned.

An fascinating characteristic of the malware is that all contaminated devices can be leveraged as command and management servers.

The whole code for the malware is contained in a one perform referred to as recursively, creating it more durable to examine.

Léveillé stated that a great exercise to thwart the malware would be to avert the credential harvesting with experimented with and legitimate solutions.

“Something we’ve reported considering the fact that the WINDIGO paper: Our suggestion is to operate two-factor identification on SSH,” he claimed.

For the Linux people, that could be a fewer prevalent apply. Léveillé notes there are a number of totally free selections out there together with a single from Google, nevertheless the Google option is no extended preserved.


Some components of this article are sourced from:
www.scmagazine.com

Previous Post: «State Auditor’s Office Clashes With File Transfer Service Provider After State auditor’s office clashes with file transfer service provider after breach

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • High-performance computing malware targeting Linux, Solaris and possibly Microsoft
  • State auditor’s office clashes with file transfer service provider after breach
  • Security spending will top 40% in most 2021 IT budgets
  • UK ‘open banking’ efforts provide case study in risks, rewards tied to digital transformation
  • TrickBot Continues Resurgence with Port-Scanning Module
  • Medical Researcher Jailed for Selling Secrets to China
  • Indiana Launches Cyber Blog
  • FTC finalizes settlement with Zoom
  • South Carolina County Still Reeling from January Cyber-Attack
  • Tiny Kobalos Malware Bedevils Supercomputers to Steal Logins

Copyright © TheCyberSecurity.News, All Rights Reserved.