Security News > 2023 > September > New SprySOCKS Linux malware used in cyber espionage attacks
A Chinese espionage-focused hacker tracked as 'Earth Lusca' was observed targeting government agencies in multiple countries, using a new Linux backdoor dubbed 'SprySOCKS.'.
Trend Micro's analysis of the novel backdoor showed that it originates from the Trochilus open-source Windows malware, with many of its functions ported to work on Linux systems.
The malware appears to be a mixture of multiple malware as the SprySOCKS' command and control server communication protocol is similar to RedLeaves, a Windows backdoor.
In contrast, the implementation of the interactive shell appears to have been derived from Derusbi, a Linux malware.
This access is used to spread laterally on the network while exfiltrating files, stealing account credentials, and deploying additional payloads, like ShadowPad. The threat actors also use the Cobalt Strike beacons to drop the SprySOCKS loader, a variant of the Linux ELF injector called "Mandibule," which arrives on targeted machines in the form of a file named 'libmonitor.
Free Download Manager site redirected Linux users to malware for years.
News URL
Related news
- DinodasRAT malware targets Linux servers in espionage campaign (source)
- South Korean Citizen Detained in Russia on Cyber Espionage Charges (source)
- Hackers leverage 1-day vulnerabilities to deliver custom Linux malware (source)
- DarkGate Malware Exploited Recently Patched Microsoft Flaw in Zero-Day Attack (source)
- Week in review: Cybersecurity job openings, hackers use 1-day flaws to drop custom Linux malware (source)
- Suspected Russian Data-Wiping 'AcidPour' Malware Targeting Linux x86 Devices (source)
- From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks (source)
- New BunnyLoader Malware Variant Surfaces with Modular Attack Features (source)
- Over 100 US and EU orgs targeted in StrelaStealer malware attacks (source)
- U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber Espionage Operation (source)