Rust-based Luca stealer targets Linux and Windows systems

Threat actors are shifting from traditional languages like C and C++ to modern ones such as Rust, enabling cross-platform malware development. A new Rust-based information stealer called Luca has emerged, released openly to the public. This development highlights growing use of Rust in malware, posing new challenges for cybersecurity defenders.

Malware developers are increasingly turning to languages like Golang, Rust, and Nim, moving away from C and C++. This change allows them to compile malicious code for both Linux and Windows platforms with few adjustments. Among recent threats, Luca Stealer stands out as a Rust-built information stealer that has surfaced in the wild, appearing alongside dangers like BlackCat ransomware.

Rust's role in malware is still nascent compared to Golang but is growing quickly. Luca Stealer's public open-source release offers researchers a chance to examine Rust's application in harmful software, aiding in the creation of better defenses. However, this shift demands fresh approaches to analyze and reverse-engineer these advanced binaries.

Defenders face hurdles with Rust executables. Unlike C programs, Rust strings lack null termination, leading tools like Ghidra to misread data and create overlapping definitions. Analysts often need to manually adjust code bytes and redefine strings for accurate analysis. Locating the main function also requires understanding Rust compiler outputs; the entry point sets up the environment before invoking std::rt::lang_start_internal, which links to the user's primary function via argument tracing.

Helpfully, Rust's Cargo build system leaves traces. Dependencies, or 'crates,' are statically linked, and patterns like 'cargo\registry' can expose libraries such as reqwest for HTTP operations. Debug sections might retain PDB paths, revealing details like the author's username or system directories. As Rust gains traction among threat actors, grasping these traits is vital for detection efforts.

Mga Kaugnay na Artikulo

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Larawang ginawa ng AI

Russian hackers use Linux VMs to hide malware on Windows

Iniulat ng AI Larawang ginawa ng AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Building on Rust's new permanent status in the Linux kernel—following its history from 2019 experiments to the Tokyo Maintainers Summit approval—production deployments like Android 16's Rust allocator are live, alongside advanced drivers and safety gains, though criticisms highlight ongoing hurdles.

Iniulat ng AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Marking a historic shift after the 2025 Kernel Maintainer Summit's approval—detailed in our prior coverage on benchmarks and challenges—Rust is now a permanent fixture in the Linux kernel, with deep roots tracing back to 2019 and ambitious plans ahead.

Iniulat ng AI

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Iniulat ng AI

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

 

 

 

Gumagamit ng cookies ang website na ito

Gumagamit kami ng cookies para sa analytics upang mapabuti ang aming site. Basahin ang aming patakaran sa privacy para sa higit pang impormasyon.
Tanggihan