[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip / qa] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: Untitled.jpg (277 KB, 1600x900)
277 KB
277 KB JPG
>>
A new Linux backdoor called 'WolfsBane' has been discovered, believed to be a port of Windows malware used by the Chinese 'Gelsemium' hacking group.

ESET security researchers who analyzed WolfsBane report that WolfsBane is a complete malware tool featuring a dropper, launcher, and backdoor, while it also uses a modified open-source rootkit to evade detection.

The researchers also discovered 'FireWood,' another Linux malware that appears linked to the 'Project Wood' Windows malware.

However, FireWood is more likely a shared tool used by multiple Chinese APT groups rather than an exclusive/private tool created by Gelsemium.

ESET says the two malware families, both appearing on VirusTotal over the last year, are part of a broader trend where APT groups increasingly target Linux platforms due to Windows security getting stronger.

"The trend of APT groups focusing on Linux malware is becoming more noticeable. We believe this shift is due to improvements in Windows email and endpoint security, such as the widespread use of endpoint detection and response (EDR) tools and Microsoft's decision to disable Visual Basic for Applications (VBA) macros by default. Consequently, threat actors are exploring new attack avenues, with a growing focus on exploiting vulnerabilities in internet-facing systems, most of which run on Linux."
ESET

WolfsBane's stealthy howl

WolfsBane is introduced to targets via a dropper named 'cron,' which drops the launcher component disguised as a KDE desktop component.

Depending on the privileges it runs with, it disables SELinux, creates system service files, or modifies user configuration files to establish persistence.


Source;

https://www.bleepingcomputer.com/news/security/chinese-gelsemium-hackers-use-new-wolfsbane-linux-malware/

https://www.welivesecurity.com/en/eset-research/unveiling-wolfsbane-gelsemiums-linux-counterpart-to-gelsevirine/#Technical%20analysis
>>
The launcher loads the privacy malware component, 'udevd,' which loads three encrypted libraries containing its core functionality and command and control (C2) communication configuration.

Finally, a modified version of the BEURK userland rootkit is loaded via '/etc/ld.so.preload' for system-wide hooking to help hide processes, files, and network traffic related to WolfsBane's activities.

"The WolfsBane Hider rootkit hooks many basic standard C library functions such as open, stat, readdir, and access," explains ESET.

"While these hooked functions invoke the original ones, they filter out any results related to the WolfsBane malware."

WolfsBane's main operation is to execute commands received from the C2 server using predefined command-function mappings, which is the same mechanism as the one used in its Windows counterpart.

These commands include file operations, data exfiltration, and system manipulation, giving Gelsemium total control over compromised systems.

FireWood overview

Though only loosely linked to Gelsemium, FireWood is another Linux backdoor that could enable versatile, long-term espionage campaigns.

Its command execution capabilities enable operators to perform file operations, shell command execution, library loading/unloading, and data exfiltration.

ESET identified a file named 'usbdev.ko,' which is suspected of operating as a kernel-level rootkit, providing FireWood with the ability to hide processes.

The malware sets its persistence on the host by creating an autostart file (gnome-control.desktop) in '.config/autostart/,' while it can also include commands in this file to execute them automatically on system startup.

A comprehensive list of indicators of compromise associated with the two new Linux malware families and Gelsemium's latest campaigns are available on this GitHub repository.

https://github.com/eset/malware-ioc/tree/master/gelsemium
>>
what is the initial attack vector?
>>
>>103276994
Honestly, I really don't know, what I don know is that SELinux is mostly used by the glowniggers.
>>
>>103276994
>manually download the virus executable
>chmod +x virus-app
>sudo ./virus-app
>enter root password
>>
File: 8676443.png (113 KB, 400x400)
113 KB
113 KB PNG
>>103277098
Is there a way to defend against this?
>>
File: 1000002572.jpg (13 KB, 306x290)
13 KB
13 KB JPG
But I'm using openpepe with AppArmor
>>
>>103276994
Sudo apt install
>>
no an issue in immutable distros
>>
>>103276875
>my main drive is Devuan with apparmor enabled, dedicated firejail profiles simlinked to all executables and strict iptables rules plus a separate /tmp partition mounted with nodev, nosuid and noexec (also binded to /var/tmp).
Yeah, not my problem.
>>
>>103277485
>binded
good morning saar
>>
File: minor-spelling-mistake.gif (259 KB, 220x194)
259 KB
259 KB GIF
>>103277531
...fuck me.
>>
File: 1321546847916217.jpg (67 KB, 857x829)
67 KB
67 KB JPG
>>103277485
impressive, very nice
>>
>>103277485
>non related question
how to start a software? it is not "systemctl" command.
>>
File: 1722990556610807.png (995 KB, 1006x1024)
995 KB
995 KB PNG
>>103277658
try "dinitctl" instead
>>
>>103276875
>>103276890
tl;dr
>>
>>103277738
linux is compromised
>>
>>103276885
>KDE
hopefully everyone using this trash you get chink nigger virus and DIE
>>
>>103277902
Interesting that the article speculates that they target linux systems more because a lot of them are web-facing. But those that are shouldn't have KDE running all that often because that's the opposite of a lightweight server DE right?
>>
>>103277951
It only says disguises as KDE. It might show up on a system that doesn't have KDE.

Did I read it right? It's just the disguise, not a mechanism.
>>
>>103278370
I took it to mean that disguising itself as a KDE plugin of sorts is a way of getting executed in the first place, as an infiltration vector. That requires the system to run KDE. That requires, in conjunction with the condition of being web-facing, a bloated setup because who needs KDE on a server.
Either way it seems like a case of download & execute?
>>
>>103278577
do you need a kde setup to run a kde app? I have always been a tiling wm fag so I don't remember/know much about kde or gnome shit tbqh
>>
>>103276875
>installs steam
>nukes desktop environment
there's your malware lol
>>
>>103277098
its over who could save us?
>>
>>103278605
I intuitively assumed it's related to the many auto-loading stuff. Plenty of "community content" that may or may not be secure. I am neither informed nor knowledgeable though. Would make it a little more than
>sudo ./virus-app
>>
File: bane.png (11 KB, 833x85)
11 KB
11 KB PNG
Guys… ?
>>
>>103278784
Doesn't mean much on its own. Begs the question whether non-systemd systems are not affected (again) or it's both implementations
>>
File: 14142517485362596.jpg (22 KB, 474x512)
22 KB
22 KB JPG
>>103278784
chink'd
>>
just stop downloading and running malware as root lil bro.
>>
>>103277746
Always was.
>>
File: 1347928949.jpg (57 KB, 640x480)
57 KB
57 KB JPG
>>103278821
No
>>
File: 1716775612153320.png (36 KB, 814x1000)
36 KB
36 KB PNG
>>103276875
>Chinese hackers target Linux with new WolfsBane malware
not my problem
>>
>>103278885
lmao hackers exploited a motherfucking Hardware Backdoor for years on apple silicon
https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/#gsc.tab=0
>>
File: Artix_logo.svg.png (203 KB, 2003x2048)
203 KB
203 KB PNG
>yet another shitstaind backdoor
not my problem
>>
>>103278834
stop it!
>>
File: oompa_loompa_10045.png (1.23 MB, 1024x768)
1.23 MB
1.23 MB PNG
>>103276885
>is a complete malware tool featuring a dropper, launcher, and backdoor
But can it force people to play and win a game of tic-tac-toe before they get control of their machine back? I miss sub7.
>>
>>103278834
kek, nice edit
>>
>>103278936
Actual proof or just flamebait? Last I checked we definitely run udev too
>>
>>103278968
sub7 and early RATs were pure soul kino
>>
>>103278901
>iphone
>>
File: m_series.png (5 KB, 313x41)
5 KB
5 KB PNG
>>103279140
What part of APPLE SILICON you didn't understand?
>>
>>103279187
>M1 and M2
i got the M4 LOLE
>>
>>103279333
That got released after the xploit, but seeing how apple keep that Hardware Backdoor in every device, I doubt they remove it, they need to be able to access every device somehow.
>>
tldr tho
>>
>>103279406
t. retard zoomer with no attention span, maybe a tiktok video would help you brainless faggots
>>
File: 1732257510467593.png (73 KB, 218x232)
73 KB
73 KB PNG
Who cares, I use mac.
>>
>>103279473
based
>>
File: 1731727564584460.gif (3.11 MB, 375x498)
3.11 MB
3.11 MB GIF
someone tell me what the attack vectors are im going fucking insane



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.