Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Linux malicious programs “Auto Collar” Hackers Complete Access to Broken Systems
Global Security

New Linux malicious programs “Auto Collar” Hackers Complete Access to Broken Systems

AdminBy AdminFebruary 26, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 26, 2025Red LakshmananLinux / Endpoint Security

Universities and state organizations in North America and Asia were aimed at previously unregistered Linux malware called Auto Color in November to December 2024, according to the Palo Alto Networks 42.

“After installing a car coloration allows the subject to threaten full remote access to compromised machines, which is very difficult to remove without specialized software,” security researcher Alex Armstrong – Note In the technical record of malicious software.

Cybersecurity

The carculator named the initial load on the basis of the file name renamed the installation itself after installation. It is currently unknown how it reaches its goals, but what is known is that it requires that the victim clearly launches him by his Linux car.

A noticeable aspect of malicious software is the arsenal of the tricks it uses to evade detection. This includes the use of seemingly incomprehensible file names such as a door or an egg, hiding team connections and control (C2), as well as using your own encryption algorithms to disguise information about communication and configuration.

After launching with root privileges, it continues to install a malicious library implant called “Libcext.So.2” to establish persistence on the host.

“If the current user lacks root privileges, malicious software will not continue to install the system,” Armstrong said. “It will do it as much as possible at its next stages without this library.”

The library implant is equipped for passive functional features used in libc for interception Open () system callwhich it uses to hide C2 communications by changing “/Proc/Net/TCP”, “a file containing information about all active network connections. The same technique has been taken by another malicious Linux software called Symbiot.

Cybersecurity

It also prevents the removal of malware by protecting “/etc/ld.Preload” from further modification or removal.

Then the auto -collar target IP -Draces and even remove yourself with the switch.

“After execution, the malicious software tries to receive remote instructions from the command server, which can create a reverse shell in the victim system,” Armstrong said. “The actors threatens separately and encrypt each IP -server teams with their own algorithm.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.