Malware Baru Menargetkan Sistem Linux dan Perangkat IoT!

New Malware Targets Linux Systems and IoT Devices!

New parts of malware Linux a hidden device called Shikitega has been found to adopt a multi-stage chain of infection to compromise end points, IoT devices and deposit additional payloads. The findings add to the growing list of Linux malware discovered in recent months. Including BPFDoor, Symbiote, Syslogk, OrBit, and Lightning Framework. Once deployed on the targeted host, the attack chain downloads and executes Metasploit's "Mettle" meterpreter. To maximize control, exploit vulnerabilities to escalate its privileges, add persistence to the host through crontab, and finally launch a cryptocurrency miner. On infected devices.

     Shikitega has the ability to download next-stage payloads from a command-and-control (C2) server and execute them directly in memory. Malware operators use "Shikata ga nai" polymorphic encoders to make them harder to detect by antivirus engines and abuse legitimate cloud services for C2 functionality.

     Shikitega also points to the tendency of malicious actors to expand the reach of their attacks to accommodate Linux operating systems that are widely used in cloud platforms and servers around the world.

     The emergence of this new Linux ransomware family is directly related to a 75% increase in ransomware attacks targeting Linux systems. In the first half of 2022 compared to the first half of 2021. Threat actors are constantly looking for ways to deliver malware in new ways to stay under the radar and evade detection.

Berita Rekomendasi

Solusi Rekruitasi Karyawan Anda

30/09/2024

Your Employee Recruitment Solution

Recruitment is a series of processes for withdrawing a group of candidates based on the qualifications and criteria proposed by the company. This process is carried out in the hope of getting prospective employees who are competent in their fields. The recruitment stage of each ...

View
Reacibility Requirement Matrix

11/11/2024

Reacibility Requirement Matrix

1. What is the Requirements traceability Matrix (RTM)? The Requirements traceability Matrix (RTM) is a document that shows the relationship between requirements and other artifacts. It is used to prove that the requirements have been met....

View
Bagaimana Cara Merawat Laptop Dengan Baik

11/11/2024

How to Take Good Care of a Laptop

Currently, laptops don't seem to be expensive anymore, now they are widely available on the market from low end to high end. Many people already have it either just used for lifestyle,...

View