Security News > 2023 > July > Fake Linux vulnerability exploit drops data-stealing malware
Cybersecurity researchers and threat actors are targeted by a fake proof of concept CVE-2023-35829 exploit that installs a Linux password-stealing malware.
The fake PoC claims to be an exploit for CVE-2023-35829, a high-severity use-after-free flaw impacting the Linux kernel before 6.3.2.
In reality the PoC is a copy of an old, legitimate exploit for another Linux kernel vulnerability, CVE-2022-34918.
Using fake PoCs to target researchers and threat actors with malware is not new.
The North Korean Lazarus hackers are also believed responsible for a 2021 campaign using social media to target vulnerability researchers with fake PoCs that installed backdoors.
Fake zero-day PoC exploits on GitHub push Windows, Linux malware.
News URL
Related news
- BootKitty UEFI malware exploits LogoFAIL to infect Linux systems (source)
- Chinese hackers target Linux with new WolfsBane malware (source)
- APT-C-60 Hackers Exploit StatCounter and Bitbucket in SpyGlace Malware Campaign (source)
- Researchers discover first UEFI bootkit malware for Linux (source)
- Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware (source)
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785) (source)
- New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools (source)
- New stealthy Pumakit Linux rootkit malware spotted in the wild (source)
- Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms (source)
- New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-06-18 | CVE-2023-35829 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 6.3.2. | 7.0 |
2022-07-04 | CVE-2022-34918 | Type Confusion vulnerability in multiple products An issue was discovered in the Linux kernel through 5.18.9. | 7.8 |