FYI this same article was already posted in this group yesterday and there’s been quite a bit of discussion on the subject.
[deleted]
Submitted 8 months ago by aPirate@lemmy.dbzer0.com to technology@lemmy.world
Comments
Shdwdrgn@mander.xyz 8 months ago
autotldr@lemmings.world [bot] 8 months ago
This is the best summary I could come up with:
Researchers have unearthed Linux malware that circulated in the wild for at least two years before being identified as a credential stealer that’s installed by the exploitation of recently patched vulnerabilities.
The newly identified malware is a Linux variant of NerbianRAT, a remote access Trojan first described in 2022 by researchers at security firm Proofpoint.
Checkpoint went on to conclude that Magnet Goblin—the name the security firm uses to track the financially motivated threat actor using the malware—has installed it by exploiting “1-days,” which are recently patched vulnerabilities.
“Magnet Goblin, whose campaigns appear to be financially motivated, has been quick to adopt 1-day vulnerabilities to deliver their custom Linux malware, NerbianRAT and MiniNerbian,” Checkpoint researchers wrote.
In the past, Magnet Goblin has installed the malware by exploiting one-day vulnerabilities in Magento, Qlink Sense, and possibly Apache ActiveMQ.
In the course of its investigation into the Ivanti exploitation, Checkpoint found the Linux version of NerbianRAT on compromised servers that were under the control of Magnet Goblin.
The original article contains 451 words, the summary contains 165 words. Saved 63%. I’m a bot and I’m open source!
PrefersAwkward@lemmy.world 8 months ago
Do we have good malware scanners and anti malware for Linux these days? Forgive my ignorance.
InvestBurnout@fedia.io 8 months ago
The only one that I can think of is ClamAV.
skankhunt42@lemmy.ca 8 months ago
Link too me to the comments.
arstechnica.com/…/never-before-seen-linux-malware…