Security News > 2021 > January > FreakOut malware exploits critical bugs to infect Linux hosts
An active malicious campaign is currently targeting Linux devices running software with critical vulnerabilities that is powering network-attached storage devices or for developing web applications and portals.
The purpose is to infect machines with vulnerable versions of the popular TerraMaster operating system, the Zend Framework, or Liferay Portal with FreakOut malware, which can help deploy a wide variety of cyberattacks.
The common ground for all three software solutions targeted in the ongoing FreakOut campaign is that they all have a large user base and have fixed critical issues recently.
Security researchers at Check Point discovered the FreakOut attacks and say that infected Linux devices join a botnet that could help deploy other cyberattacks.
FreakOut malware is new on the scene and can serve for port scanning, collect information, network sniffing, or to launch distributed denial-of-service attacks.
In a technical report today, Check Point provides a large list of the FreakOut malware capabilities along with details about the author and the infected systems.
News URL
Related news
- New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency (source)
- North Korean hackers exploit VPN update flaw to install malware (source)
- New Linux Kernel Exploit Technique 'SLUBStick' Discovered by Researchers (source)
- Ivanti warns of critical vTM auth bypass with public exploit (source)
- Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware (source)
- Hackers use PHP exploit to backdoor Windows systems with new malware (source)
- Stealthy 'sedexp' Linux malware evaded detection for two years (source)
- New Linux Malware 'sedexp' Hides Credit Card Skimmers Using Udev Rules (source)
- Malware exploits 5-year-old zero-day to infect end-of-life IP cameras (source)
- Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign (source)