• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers warn of new orbit linux malware that hijacks execution

Researchers Warn of New OrBit Linux Malware That Hijacks Execution Flow

You are here: Home / General Cyber Security News / Researchers Warn of New OrBit Linux Malware That Hijacks Execution Flow
July 7, 2022

Cybersecurity researchers have taken the wraps off a new and solely undetected Linux threat dubbed OrBit, signally a escalating development of malware attacks geared towards the well-liked working process.

The malware receives its name from one of the filenames that is utilized to quickly retail store the output of executed instructions (“/tmp/.orbit”), in accordance to cybersecurity agency Intezer.

“It can be put in possibly with persistence abilities or as a volatile implant,” security researcher Nicole Fishbein said. “The malware implements highly developed evasion tactics and gains persistence on the machine by hooking important features, provides the threat actors with remote access capabilities more than SSH, harvests qualifications, and logs TTY instructions.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


OrBit is the fourth Linux malware to have come to mild in a short span of a few months right after BPFDoor, Symbiote, and Syslogk.

The malware also functions a great deal like Symbiote in that it’s designed to infect all of the operating procedures on the compromised devices. But in contrast to the latter which leverages the LD_PRELOAD surroundings variable to load the shared item, OrBit employs two distinctive procedures.

“The initially way is by introducing the shared object to the configuration file that is made use of by the loader,” Fishbein spelled out. “The next way is by patching the binary of the loader by itself so it will load the malicious shared object.”

The attack chain commences with an ELF dropper file that’s accountable for extracting the payload (“libdl.so”) and adding it to the shared libraries that are becoming loaded by the dynamic linker.

The rogue shared library is engineered to hook functions from 3 libraries — libc, libcap, and Pluggable Authentication Module (PAM) — triggering current and new procedures to use the modified capabilities, in essence allowing it to harvest qualifications, conceal network exercise, and set up remote obtain to the host about SSH, all the while keeping underneath the radar.

CyberSecurity

Also, OrBit relies on a barrage of procedures that lets it to operate without having alerting its existence and set up persistence in a way that tends to make it tough to take away from the infected machines.

When engaged, the backdoor’s final intention is to steal info by hooking the read and write features to seize information which is remaining penned by the executed processes on the machine, including bash and sh commands, the outcomes of which are saved in distinct files.

“What can make this malware specifically attention-grabbing is the nearly hermetic hooking of libraries on the victim machine, that enables the malware to gain persistence and evade detection whilst thieving information and setting SSH backdoor,” Fishbein claimed.

“Threats that focus on Linux continue on to evolve whilst successfully keeping underneath the radar of security equipment, now OrBit is one particular much more case in point of how evasive and persistent new malware can be.”

Found this write-up appealing? Observe THN on Facebook, Twitter  and LinkedIn to go through far more exceptional articles we submit.


Some elements of this posting are sourced from:
thehackernews.com

Previous Post: «apple's new "lockdown mode" protects iphone, ipad, and mac against Apple’s New “Lockdown Mode” Protects iPhone, iPad, and Mac Against Spyware
Next Post: Marriott Plays Down 20GB Data Breach Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.