New ultra-stealthy Linux backdoor isn’t your everyday malware discovery

Symbiote gives remote access to any account. Normal methods don't detect it.

By DAN GOODIN - 6/10/2022, 8:36 AM  
https://arstechnica.com/information-technology/2022/06/novel-techniques-in-never-before-seen-linux-backdoor-make-it-ultra-stealthy/


Researchers have unearthed a discovery that doesn’t occur all that often in the 
realm of malware: a mature, never-before-seen Linux backdoor that uses novel 
evasion techniques to conceal its presence on infected servers, in some cases 
even with a forensic investigation.

On Thursday, researchers from Intezer and The BlackBerry Threat Research & 
Intelligence Team said that the previously undetected backdoor combines high 
levels of access with the ability to scrub any sign of infection from the file 
system, system processes, and network traffic.

Dubbed Symbiote, it targets financial institutions in Brazil and was first 
detected in November.

Researchers for Intezer and BlackBerry wrote:

What makes Symbiote different from other Linux malware that we usually come 
across, is that it needs to infect other running processes to inflict damage on 
infected machines.

Instead of being a standalone executable file that is run to infect a machine, 
it is a shared object (SO) library that is loaded into all running processes 
using LD_PRELOAD (T1574.006), and parasitically infects the machine.

Once it has infected all the running processes, it provides the threat actor 
with rootkit functionality, the ability to harvest credentials, and remote 
access capability.

With the help of LD_PRELOAD, Symbiote will load before any other shared 
objects. That allows the malware to tamper with other library files loaded for 
an application.

“When an administrator starts any packet capture tool on the infected machine, 
BPF bytecode is injected into the kernel that defines which packets should be 
captured,” the researchers wrote. “In this process, Symbiote adds its bytecode 
first so it can filter out network traffic that it doesn’t want the 
packet-capturing software to see.”

One of the stealth techniques Symbiote uses is known as libc function hooking. 
But the malware also uses hooking in its role as a data-theft tool. “The 
credential harvesting is performed by hooking the libc read function,” the 
researchers wrote. “If an ssh or scp process is calling the function, it 
captures the credentials.”

So far, there’s no evidence of infections in the wild, only malware samples 
found online.

It’s unlikely this malware is widely active at the moment, but with stealth 
this robust, how can we be sure?

---

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to