Home Malware Stealthy Linux implant BPFdoor compromised organizations globally for years

Stealthy Linux implant BPFdoor compromised organizations globally for years

Source Link

Malware researchers warn about a stealthy backdoor program that has been used by a Chinese threat actor to compromise Linux servers at government and private organizations around the world. While the backdoor is not new and variants have been in use for the past five years, it has managed to fly under the radar and have very low detection rates. One reason for its success is that it leverages a feature called the Berkeley Packet Filter (BPF) on Unix-based systems to hide malicious traffic.

BPFdoor was named by researchers from PwC Threat Intelligence who attribute it to a Chinese group they call Red Menshen. The PwC team found the threat while investigating several intrusions throughout Asia last year and included a short section about it in their annual threat report released late last month

This short mention didn’t get a lot of attention until independent security researcher Kevin Beaumont shared the link to a malware sample with low detection rate on VirusTotal a few days ago. This prompted confirmation by the PwC team that what Beaumont found was a controller for the passive BPFdoor backdoor. This prompted a more detailed write-up by Beaumont who was also independently tracking the malware since last year.

“I swept the internet for BPFDoor throughout 2021 and discovered it is installed at organizations in across the globe — in particular the U.S., South Korea, Hong Kong, Turkey, India, Viet Nam and Myanmar, and is highly evasive,” Beaumont said in a blog post. “These organizations include government systems, postal and logistic systems, education systems and more.”

How BPFdoor abuses BPF

While the PwC researchers plan to share more details about the backdoor at a conference in June, other researchers, including Beaumont, have already located more samples on VirusTotal potentially uploaded by victims or other parties over the years. In addition to the samples, the source code of an older variant of the backdoor was posted online and was analyzed by Linux intrusion detection and incident response firm Sandfly Security.

“The BPFDoor source is small, focused and well written,” the Sandfly researchers said. “While the sample we reviewed was Linux specific, with some small changes it could easily be ported to other platforms (a Solaris binary reportedly exists). BPF is widely available across operating systems and the core shell functions would likely work across platforms with little modification.”

Copyright © 2022 IDG Communications, Inc.

Related Articles

Leave a Comment

techhipbettruvabetnorabahisbahis forumutaraftarium24eduseduseduedueduedusedueduseduedu
sugar rush 1000
pin up aviator
kingbetting giriş
cashwin giris
inagaming giriş
betmarino giriş
alev casino
plinko romania
biabet giris
biabet giris
casino milyon
super gra
betwild giris
plinko demo
stake giriş
rexbet giriş
aviator casino
betwild giris
rulet oyna
atlasbet giriş