• About
  • Advertise
  • Careers
  • Contact
Saturday, June 3, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

This New Linux Malware Mines Crypto By Creating Malign Linux Modules

by Cyber360 News
November 11, 2019
in Security
0
This New Linux Malware Mines Crypto By Creating Malign Linux Modules
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

Cybersecurity research firm TrendMicro has come across a new Linux malware. The malware — Skidmap — is capable of illicit cryptocurrency mining activities.

Skidmap is the new Linux malware in town

As per the research, the new Linux malware mines crypto by creating malicious loadable kernel modules (LKM) to stay under the wraps. As the malware utilizes Linux kernel module rootkits, it becomes difficult to detect and patch it. This is because of its overwriting and modification of kernel parts capabilities.

jamf now

Apart from cryptocurrency mining, the new Linux malware can grant the attackers backdoor access to the affected system by creating a secret master password for unauthorized access on the part of anyone.

How does Skidmap malware work?

Skidmap Linux malware enters the system via crontab (commands to regularly schedule jobs in Unix-like computer OS). Once it gets through the victim system, it installs malicious binaries (“pc”), which eventually lowers down the security settings of the device to conduct the crypto mining.

However, there is no word on which cryptocurrency the malware mines.

To inject a system with a cryptocurrency miner, the malware figures out the system’s OS — if it is based on Debian or RHEL/CentOS.

Skipmap Linux malware
Image: TrendMicro

For a Debian-based system, it infects the system by saving the crypto miner payload to “/tmp/miner2”. An RHEL/CentOS-based system gets its crypto miner payload and other components in the form of a tar file from the URL “hxxp://pm[.]ipfswallet[.]tk/cos7[.]tar[.]gz.”

In addition to this, the Linux malware devises another method of unauthorized access to the infected system.

This is done by replacing the system’s “pam_unix.so file” (the file is meant for conventional Unix authentication) with its malicious variant, identified as “Backdoor.Linux.PAMDOR.A.”

With the help of the process above, attackers can access the system as any user.

Skidmap’s other malicious components

Additionally, the report suggests that Skidmap has various parts to further the Linux malware’s malicious intents.

These components include a fake “rm” binary, a kaudited binary to install several LKMs, an Iproute module, and a Netlink rootkit used to fake network stats.

You can read the full research report for a better understanding of Skidmap’s components.

Methods to stay off Linux malware

As the cryptocurrency-mining threat is more than prevalent and leads to higher expenses and disruption of business, users should follow certain precautions to remain safe.

jamf now

Users should keep their servers and systems patched and updated and should be cautious of third-party repositories.

Also Read: Thousands Of Linux Servers Infected By Lilu (Lilocked) Ransomware
Cyber360 News

Cyber360 News

Next Post
Destructive Malware Botnet “Emotet” Is Making A Comeback

Destructive Malware Botnet “Emotet” Is Making A Comeback

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In