New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

A new multi-platform backdoor is leveraged by an advanced threat actor

New York Tech Editorial Team by New York Tech Editorial Team
January 12, 2022
in Cybersecurity
0
A new multi-platform backdoor is leveraged by an advanced threat actor
Share on FacebookShare on Twitter

A novel multi-platform backdoor dubbed SysJoker has been successfully evading security solutions since mid-2011.

“In the Linux and macOS versions, it masquerades as a system update. In the Windows version, it masquerades as Intel drivers. The update names are somewhat generic: In the macOS version, the file is relocated and named ‘updateMacOs’ and in the Linux version it is named ‘updateSystem’,” Avigayil Mechtinger, security researcher at Intezer, has shared with Help Net Security.

SysJoker: A multi-platform backdoor

Intezer researchers have spotted the backdoor during an active attack on an Apache web server of a leading educational institution. It had been uploaded via a reverse shell.

SysJoker’s behavior is similar for all three operating systems: once executed, it “sleeps” for 90 to 120 seconds before it starts to:

  • Create directories and copy itself
  • Gather information about the machine (MAC address, user name, physical media serial number, IP address)
  • Add entries to a registry key to achieve persistence
  • Contact a command and control server

The various instructions it can receive from the C2 server allow it to drop and run another executable, as well as run specific commands.

multi-platform backdoor

The only difference between the Windows version and those for Linux and macOS is that the former contains a first-stage dropper.

A stealthy threat

When the researchers published their findings on Tuesday (January 12), SysJoker’s Linux and macOS versions still went undetected by the various security solutions on VirusTotal. In the meantime, a dozen or so became able to spot them.

“Based on C2 domain registration and samples found in VirusTotal, we estimate that the SysJoker attack was initiated during the second half of 2021. During our analysis the C2 changed three times, indicating the attacker is active and monitoring for infected machines,” the researchers shared.

They have not observed many samples of the malware in the wild, so they believe that attacks leveraging are limited in scope.

Among other possible reasons given by Mechtinger for the malware’s prolonged flying under the radar are the immaturity of security tools for Linux and macOS systems and the obfuscation of the C2 server domains.

“The domain is dynamically fetched from a Google Drive link, therefore the address is easy to update, and any traffic to Google drive will not normally be seen as suspicious in a network,” he explained.

It is unknown whether there have been other targets / victims. Judging by the current available information, the attacker seems to focus on academic institutions.

“One of the C2 server domains typosquats the software ‘Bookitlab’, which is commonly used by universities and scientific institutions for facility management and lab equipment scheduling software,” Mechtinger shared.

The researchers believe that the SysJoker attack is performed by an advanced threat actor because the malware’s code (for all operating systems) is original, because it’s rare to find previously unseen Linux malware in a live attack, and because they haven’t witnessed a second stage or command sent from the attacker (meaning that the attack is specific).

Remediation

It’s impossible to tell whether the malware is setting the stage for cyber espionage or ransomware delivery. Still, none of these objectives are good news for potential targets, and could lead to very negative outcomes.

The researchers have released indicators of compromise (IoCs) and detection content to help defenders hunt for infected machines on their networks, and have offered advice on remediation.

Credit: Source link

Previous Post

FinTech Car Capital: $150M Credit Facility

Next Post

Europe’s Unicorn Herd Multiplies As VC Investment More Than Doubled In 2021 – Crunchbase News

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
Europe’s Unicorn Herd Multiplies As VC Investment More Than Doubled In 2021 – Crunchbase News

Europe’s Unicorn Herd Multiplies As VC Investment More Than Doubled In 2021 – Crunchbase News

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Recommended

New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media