Cadastre-se agora para um orçamento mais personalizado!

FontOnLake malware strikes Linux systems in targeted attacks

11 de outubro de 2021 Hi-network.com

A brand of malware that has previously gone undetected is being used in targeted attacks against Linux systems. 

Linux

  • The best Linux laptops for consumers and developers
  • Want to save your aging computer? Try these 5 Linux distributions
  • The best distros for beginners
  • How to enable Linux on your Chromebook (and why you should)

According to researchers from cybersecurity firm ESET, the malware, named FontOnLake, appears to be well-designed and while under active development already includes remote access options, credential theft features, and is able to initialize proxy servers. 

FontOnLake samples first appeared on VirusTotal in May 2020 but the command-and-control (C2) servers linked to these files are disabled, which the researchers say may be due to the uploads. 

The researchers added that Linux systems targeted by the malware may be located in areas including Southeast Asia.  

ESET believes the operators are "overly cautious" about being caught and their activities exposed as almost all samples obtained use different C2 server addresses and a variety of ports. Furthermore, the malware's authors make use of C/C++ and a number of third-party libraries such as Boost and Protobuf. 

FontOnLake is modular malware that harnesses custom binaries to infect a machine and to execute malicious code. While ESET is still investigating FontOnLake, the firm says that among its known components are trojanized apps which are used to load backdoors, rootkits, and to collect information.

"Patches of the applications are most likely applied on the source code level, which indicates that the applications must have been compiled and replaced the original ones," the team says. 

In total, three backdoors have also been connected to FontOnLake. The backdoors are all written in C++ and create a bridge to the same C2 for data exfiltration. In addition, they are able to issue "heartbeat" commands to keep this connection active. 

FontOnLake is always joined with a kernel-mode rootkit to maintain persistence on an infected Linux machine. According to Avast, the rootkit is based on the open source Suterusu project. 

Tencent and Lacework Labs have also published research on what appears to be the same strain of malware. ESET has also released a technical whitepaper (.PDF) examining FontOnLake. 

Previous and related coverage

  • This banking Trojan abuses YouTube to manage remote settings
  • Meet Janeleiro: a new banking Trojan striking company, government targets
  • ESET takes down VictoryGate cryptomining botnet

Have a tip?Get in touch securely via WhatsApp Signal at +447713 025 499, or over at Keybase: charlie0


Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Tags quentes : Tecnologia Segurança

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.