Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Wednesday June 15 2022, @05:12AM   Printer-friendly
from the nearly-impossible-is-slightly-possible dept.

Linux Malware Deemed 'Nearly Impossible' to Detect:

Symbiote, discovered in November, parasitically infects running processes so it can steal credentials, gain rootlkit[sic] functionality and install a backdoor for remote access.

A new Linux malware that's "nearly impossible to detect" can harvest credentials and gives attackers remote access and rootkit functionality by acting in a parasitic way to infect targets, researchers said.

Researchers from The BlackBerry Research and Intelligence Team have been tracking the malware, the earliest detection of which is from November 2021, security researcher Joakim Kennedy wrote in a blog post on the BlackBerry Threat Vector Blog published last week.

Researchers have appropriately dubbed the malware—which apparently was written to target the financial sector in Latin America—"Symbiote." In biology, the word means an organism that lives in symbiosis with another organism.

"What makes Symbiote different ... is that it needs to infect other running processes to inflict damage on infected machines," he wrote. "Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes using LD_PRELOAD (T1574.006), and parasitically infects the machine."

Once Symbiote has infected all the running processes, a threat actor can engage in various nefarious activity, including rootkit functionality, the ability to harvest credentials, and remote access capability, Kennedy said.

In addition to the rootkit capability, the malware also provides a backdoor for the threat actor to log in as any user on the machine with a hardcoded password, and to execute commands with the highest privileges, he added.

[...] Some evasive tactics it uses is that by design, it is loaded by the linker via the LD_PRELOAD directive, which allows it to be loaded before any other shared objects, researchers found. This privilege of being loaded first allows it to hijack the imports from the other library files loaded for the application, they said. In this way, it hide its presence on the machine by hooking libc and libpcap functions, Kennedy said.

"Once the malware has infected a machine, it hides itself and any other malware used by the threat actor, making infections very hard to detect," he explained. "Performing live forensics on an infected machine may not turn anything up since all the file, processes, and network artifacts are hidden by the malware."

In fact, researchers said they themselves could not uncover enough evidence to determine whether threat actors are currently using Symbiote " in highly targeted or broad attacks," he said.

Unusual DNS requests may be one way to detect if the malware is present on a system, researchers noted. However, typical antivirus or other security tools aimed at endpoint detection and response won't pick up Symbiote, making organizations using Linux that rely on those protections at risk, they said.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: -1, Spam) by Anonymous Coward on Monday June 20 2022, @10:54PM

    by Anonymous Coward on Monday June 20 2022, @10:54PM (#1254772)

    Guess what? YOU LOSE, hosts work vs. Symbiote C2 server(s) per this line from a MUCH better article than the one used here from bradley13 per "configuration in the binary that used the git[.]bancodobrasil[.]dev domain as its C2 server" from https://www.intezer.com/blog/research/new-linux-threat-symbiote/ [intezer.com] (INTEZER's now owned by Microsoft iirc as well).

    & did I block that in my original posts here on this BOGUS sockpuppet upmodding yourselves shithole website (which also noted FIREWALLS are invaluable here too, per wildcards (or even IP address use, URL domain/subdomain too in many as well)?

    YES I DID! I was correct... & YES, hosts work vs. this threat too stupid!

    So YOU LOSE chump... a BETTER ARTICLE than what I used proves it for me!

    * THANKS FOR LOSING TO ME yet again, as always for you... try me again? THIS COMES UP AS PROOF (as well as another I have on YOU regarding using sources where YOU contradict yourself - want quotes of that too? ASK!)

    HOW ESPECIALLY EMBARASSING FOR YOU with your NO-DOUBT self-upmodded by sockpuppet accounts of YOURSELF too - now that YOU have EGG ON YOUR FACE fucko!

    APK

    P.S.=> Do yourself a FAVOR - don't ever, EVER try me ever again OR I WILL MAKE SURE YOU SHIT ON YOURSELF yet again as always, easlly... apk

    Starting Score:    0  points
    Moderation   -1  
       Spam=1, Total=1
    Extra 'Spam' Modifier   0  

    Total Score:   -1