• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
symbiote: a stealthy linux malware targeting latin american financial sector

Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector

You are here: Home / General Cyber Security News / Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector
June 9, 2022

Cybersecurity researchers have taken the wraps off what they phone a “nearly-difficult-to-detect” Linux malware that could be weaponized to backdoor contaminated techniques.

Dubbed Symbiote by menace intelligence corporations BlackBerry and Intezer, the stealthy malware is so named for its potential to conceal alone inside of functioning procedures and network site visitors and drain a victim’s sources like a parasite.

The operators powering Symbiote are thought to have commenced enhancement on the malware in November 2021, with the risk actor predominantly working with it to goal the financial sector in Latin The usa, including financial institutions like Banco do Brasil and Caixa.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Symbiote’s principal objective is to capture qualifications and to facilitate backdoor entry to a victim’s equipment,” researchers Joakim Kennedy and Ismael Valenzuela explained in a report shared with The Hacker Information. “What helps make Symbiote distinctive from other Linux malware is that it infects jogging processes rather than making use of a standalone executable file to inflict destruction.”

CyberSecurity

It achieves this by leveraging a native Linux element named LD_PRELOAD — a system formerly employed by malware such as Pro-Ocean and Facefish — so as to be loaded by the dynamic linker into all running procedures and infect the host.

Moreover hiding its existence on the file method, Symbiote is also capable of cloaking its network targeted traffic by building use of the prolonged Berkeley Packet Filter (eBPF) aspect. This is carried out by injecting alone into an inspection software’s procedure and using BPF to filter out final results that would uncover its exercise.

On hijacking all functioning procedures, Symbiote enables rootkit functionality to further conceal proof of its presence and supplies a backdoor for the risk actor to log in to the machine and execute privileged instructions. It has also been observed storing captured credentials encrypted in documents masquerading as C header data files.

CyberSecurity

This is not the first time a malware with similar abilities has been spotted in the wild. In February 2014, ESET uncovered a Linux backdoor known as Ebury which is built to steal OpenSSH credentials and manage obtain to a compromised server.

“Considering the fact that the malware operates as a person-land degree rootkit, detecting an an infection might be tough,” the researchers concluded. “Network telemetry can be applied to detect anomalous DNS requests and security applications such as AVs and EDRs should be statically connected to ensure they are not ‘infected’ by userland rootkits.”

Identified this report appealing? Stick to THN on Fb, Twitter  and LinkedIn to go through much more distinctive information we post.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «even the most advanced threats rely on unpatched systems Even the Most Advanced Threats Rely on Unpatched Systems
Next Post: Businesses at work businesses at work»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.