Security News > 2021 > November > New Linux malware hides in cron jobs with invalid dates
Security researchers have discovered a new remote access trojan for Linux that keeps an almost invisible profile by hiding in tasks scheduled for execution on a non-existent day, February 31st. Dubbed CronRAT, the malware is currently targeting web stores and enables attackers to steal credit card data by deploying online payment skimmers on Linux servers.
CronRAT abuses the Linux task scheduling system, cron, which allows scheduling tasks to run on non-existent days of the calendar, such as February 31st. The Linux cron system accepts date specifications as long as they have a valid format, even if the day does not exist in the calendar - which means that the scheduled task won't execute.
A report today from Dutch cyber-security company Sansec explains that it hides a "Sophisticated Bash program" in the names of the scheduled tasks.
"The CronRAT adds a number of tasks to crontab with a curious date specification: 52 23 31 2 3. These lines are syntactically valid, but would generate a run time error when executed. However, this will never happen as they are scheduled to run on February 31st," Sansec Researchers explain.
The researchers note that the malware contacts a command and control server using an "Exotic feature of the Linux kernel that enables TCP communication via a file."
Payload hidden in legitimate CRON scheduled task names.
News URL
Related news
- New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (source)
- Linux malware “perfctl” behind years-long cryptomining campaign (source)
- Linux systems targeted with stealthy “Perfctl” cryptomining malware (source)
- New FASTCash malware Linux variant helps steal money from ATMs (source)
- New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists (source)
- New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus (source)
- Chinese hackers target Linux with new WolfsBane malware (source)