• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
symbiote: a stealthy linux malware targeting latin american financial sector

Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector

You are here: Home / General Cyber Security News / Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector
June 9, 2022

Cybersecurity researchers have taken the wraps off what they phone a “nearly-difficult-to-detect” Linux malware that could be weaponized to backdoor contaminated techniques.

Dubbed Symbiote by menace intelligence corporations BlackBerry and Intezer, the stealthy malware is so named for its potential to conceal alone inside of functioning procedures and network site visitors and drain a victim’s sources like a parasite.

The operators powering Symbiote are thought to have commenced enhancement on the malware in November 2021, with the risk actor predominantly working with it to goal the financial sector in Latin The usa, including financial institutions like Banco do Brasil and Caixa.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Symbiote’s principal objective is to capture qualifications and to facilitate backdoor entry to a victim’s equipment,” researchers Joakim Kennedy and Ismael Valenzuela explained in a report shared with The Hacker Information. “What helps make Symbiote distinctive from other Linux malware is that it infects jogging processes rather than making use of a standalone executable file to inflict destruction.”

CyberSecurity

It achieves this by leveraging a native Linux element named LD_PRELOAD — a system formerly employed by malware such as Pro-Ocean and Facefish — so as to be loaded by the dynamic linker into all running procedures and infect the host.

Moreover hiding its existence on the file method, Symbiote is also capable of cloaking its network targeted traffic by building use of the prolonged Berkeley Packet Filter (eBPF) aspect. This is carried out by injecting alone into an inspection software’s procedure and using BPF to filter out final results that would uncover its exercise.

On hijacking all functioning procedures, Symbiote enables rootkit functionality to further conceal proof of its presence and supplies a backdoor for the risk actor to log in to the machine and execute privileged instructions. It has also been observed storing captured credentials encrypted in documents masquerading as C header data files.

CyberSecurity

This is not the first time a malware with similar abilities has been spotted in the wild. In February 2014, ESET uncovered a Linux backdoor known as Ebury which is built to steal OpenSSH credentials and manage obtain to a compromised server.

“Considering the fact that the malware operates as a person-land degree rootkit, detecting an an infection might be tough,” the researchers concluded. “Network telemetry can be applied to detect anomalous DNS requests and security applications such as AVs and EDRs should be statically connected to ensure they are not ‘infected’ by userland rootkits.”

Identified this report appealing? Stick to THN on Fb, Twitter  and LinkedIn to go through much more distinctive information we post.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «even the most advanced threats rely on unpatched systems Even the Most Advanced Threats Rely on Unpatched Systems
Next Post: Businesses at work businesses at work»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.