Researchers uncover new SysUpdate malware variant targeting Linux

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

During a digital forensics and incident response (DFIR) engagement, researchers at LevelBlue discovered a new variant of the SysUpdate malware specifically targeting Linux systems. This finding was reported on February 19, 2026. The malware sample presents as a packed ELF64 binary written in C++, dynamically linked without section headers, and protected by an unknown obfuscated packer.

To mimic a legitimate system service, the malware executes the Linux 'id' command and displays user details when launched without specific arguments. Its network activity includes encrypted command-and-control (C2) communications over multiple protocols. Analysis linked this variant to the original SysUpdate, previously tied to the APT27 group, also known as Iron Tiger.

The LevelBlue team employed tools such as Binary Ninja for decompilation, GDB for debugging, and the Unicorn Engine with Rust bindings for emulation. Static analysis revealed cryptographic constants and dense bitwise operations, with key functions including 'generate_key'—which performs 64 iterations via 'generate_key_internal'—'xor_and_UNK_1' for encryption and decryption using XOR with keys on 8-byte aligned buffers, and 'i_am_clearly_encryption_UNK' featuring S-box-like data and constants like 0xf0f0f0f.

To counter the C2 encryption, researchers emulated the malware's routines using the Unicorn Engine, mapping original memory segments including stack at 0x7ffffffde000, unknown data at 0x4fd000, heap at 0x1393000, and code segments. They used a plaintext key of “!2#4Wx62” to generate a 132-byte key saved as 'gend_key.bin'. The decryption emulator handled encrypted inputs from traffic, such as 168-byte payloads, successfully decrypting C2 data by executing routines like 'xor_and_UNK_1' with a decrypt flag.

LevelBlue noted that this approach enables rapid decryption in live incidents without complete reverse engineering, effectively using the adversary's code against itself. The evolution of SysUpdate to Linux underscores cross-platform threats from groups like Iron Tiger. Organizations are advised to watch for anomalous ELF binaries that imitate services and unusual encrypted network flows.

संबंधित लेख

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
AI द्वारा उत्पन्न छवि

Qilin ransomware deploys Linux binaries against Windows systems

AI द्वारा रिपोर्ट किया गया AI द्वारा उत्पन्न छवि

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

AI द्वारा रिपोर्ट किया गया

The pro-Russia hacktivist group CyberVolk has reemerged with a new ransomware-as-a-service platform called VolkLocker, supporting both Linux and Windows systems. First documented in 2024 by SentinelOne, the group returned after a period of inactivity caused by Telegram bans. Despite advanced automation via Telegram bots, the malware features significant encryption flaws that could allow victims to recover files without payment.

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

AI द्वारा रिपोर्ट किया गया

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

SentinelOne researchers have disclosed a critical flaw in CyberVolk's new VolkLocker ransomware-as-a-service: a hardcoded master key stored in plaintext, enabling victims to decrypt files without ransom payment. Following the group's August 2025 relaunch after Telegram bans, this weakness underscores quality issues in their RaaS ecosystem.

AI द्वारा रिपोर्ट किया गया

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

 

 

 

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए विश्लेषण के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें