New SysUpdate malware variant targets Linux systems

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

The SysUpdate malware variant emerged as a sophisticated threat to Linux environments, detected by LevelBlue analysts during a Digital Forensics and Incident Response (DFIR) engagement. The suspicious Linux binary appeared in a client's system, identified as a packed ELF64 executable using an unknown obfuscated packer without section headers, complicating traditional analysis.

Upon execution without specific arguments, the malware runs the GNU/Linux ID command to collect system information and then initiates encrypted network communications over multiple protocols. LevelBlue's dynamic analysis and endpoint detection metrics revealed strong indicators linking it to a new SysUpdate version, confirmed with high confidence through reverse engineering. The malware's C++ codebase employs complex cryptographic routines to encrypt command-and-control (C2) traffic, hindering network-based detection.

To counter this, researchers developed a decryption tool using the Unicorn Engine emulation framework during the active incident. This tool extracts machine code bytes, global data structures, heap values, and CPU register states from the malware sample. It emulates key generation from a hardcoded plaintext encryption key in the heap and decrypts 8-byte data blocks via XOR operations with an unknown algorithm, replicating the malware's memory mappings including stack, heap, data segments, and code.

The methodology integrates Binary Ninja for static analysis, GDB for dynamic debugging, and Rust-based Unicorn Engine bindings for x86-64 emulation, bypassing full reverse engineering of the cryptography. This approach enables decryption of C2 traffic for current and future variants by extracting new encryption keys.

LevelBlue recommends organizations deploy endpoint detection solutions to monitor packed ELF executables mimicking system services, conduct network traffic analysis for encrypted patterns, and prepare incident response with malware emulation capabilities.

Relaterte artikler

Illustration of a hacker deploying Qilin ransomware using Linux binaries on Windows systems, showing code and alerts in a dark ops center.
Bilde generert av AI

Qilin ransomware deploys Linux binaries against Windows systems

Rapportert av AI Bilde generert av AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Rapportert av AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Rapportert av AI

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Rapportert av AI

A deceptive package on the PyPI repository has been found impersonating the popular SymPy library. This malicious software targets Linux systems, downloading and executing the XMRig cryptocurrency miner through in-memory techniques. Security researchers have highlighted the risks posed by such supply chain attacks in open-source ecosystems.

 

 

 

Dette nettstedet bruker informasjonskapsler

Vi bruker informasjonskapsler for analyse for å forbedre nettstedet vårt. Les vår personvernerklæring for mer informasjon.
Avvis