• Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
What's Hot

Fairphone (Gen 6) review: Sustainability done the right way

July 29, 2025

Ninja Creami Deluxe ice cream maker review: If it’s icy, it’s easy

July 28, 2025

Samsung Galaxy Z Flip 7 review: The new flip phone champ

July 25, 2025
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
  • Fintech
  • Startup
  • Games
  • Ar & Vr
  • Reviews
  • How To
  • More
    • Mobile Tech
    • Pc & Laptop
    • Security
Behind The ScreenBehind The Screen
Home»Security»Stealthy Symbiote Malware Wreaks Havoc On Linux Systems
Security

Stealthy Symbiote Malware Wreaks Havoc On Linux Systems

June 28, 2022No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Latest Hacking News
Share
Facebook Twitter LinkedIn Pinterest Email

Researchers have discovered a brand new malware concentrating on Linux methods with a parasitic impact. Recognized as “Symbiote,” this new malware infects Linux processes to supply rootkit performance to the attackers.

About Symbiote Linux Malware

Following a joint evaluation of their researchers, the BlackBerry Menace Analysis & Intelligence crew and Intezer have shared insights in regards to the newly found Linux malware. The researchers have named this malware “Symbiote” because it displays a symbiotic (slightly parasitic) habits on Linux methods.

Briefly, the malware, not like different malware that aggressively kill system processes, Symbiote masses on all processes as a shared object (SO) library. On this approach, it makes use of these processes to inflict injury. As soon as finished, the malware then steals credentials from the system. Additionally, it provides distant entry to the attackers.

Apart from, it additionally displays large sneakiness by utilizing Berkeley Packet Filter (BPF) hooking performance to cover malicious community site visitors.

When an administrator begins any packet seize software on the contaminated machine, BPF bytecode is injected into the kernel that defines which packets must be captured. On this course of, Symbiote provides its bytecode first so it might filter out community site visitors that it doesn’t need the packet-capturing software program to see.

Furthermore, the malware additionally exploits the LD_PRELOAD directive to load earlier than different shared objects. That’s how the malware hijacks different library imports and evades detection. The next chart illustrates the evasion strategies that Symbiote applies throughout infections.

Whereas the researchers have not too long ago shared malware particulars, it isn’t totally new. As a substitute, the malware has been energetic within the wild, with its first samples courting again to November 2021. In response to the researchers, the menace actors used this malware to focus on monetary establishments in Latin America.

See also  Google will allow alternative payment systems for Play Store in more countries – DailyTech

The researchers discovered its code doesn’t resemble any recognized Linux malware varieties, confirming that it’s totally new malware. Nevertheless, it does exhibit slight similarities with the 2014-discovered Ebury malware, which additionally serves as a backdoor for the attackers and credential harvester.

Tell us your ideas within the feedback.

Source link

Havoc Linux malware Stealthy Symbiote Systems Wreaks
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

EU Says Apple Isn’t Allowed to Protect iPhone Users from Malware

March 20, 2024

New macOS Malware for Sale on Telegram Steals Usernames, Passwords, Files + More

May 2, 2023

No Device Left Behind? Apple Releases Swath of Security Patches for Older Operating Systems

April 11, 2023

Apple Now Has Over 200 Drivers Testing Apple Car Systems

March 24, 2023
Add A Comment

Comments are closed.

Editors Picks

Xiaomi 13 Pro review

February 27, 2023

Cozy Bear targets MS 365 environments with new tactics

August 19, 2022

Xenoblade Chronicles 3 helps get your steps in with world that is “five times larger” than last game

August 1, 2022

‘Selling Sunset’ star Christine Quinn’s brokerage debuts new crypto credit scoring platform – Fintech

August 9, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Fairphone (Gen 6) review: Sustainability done the right way

Ninja Creami Deluxe ice cream maker review: If it’s icy, it’s easy

Samsung Galaxy Z Flip 7 review: The new flip phone champ

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.fr - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.