Rust-based Luca stealer targets Linux and Windows systems

Threat actors are shifting from traditional languages like C and C++ to modern ones such as Rust, enabling cross-platform malware development. A new Rust-based information stealer called Luca has emerged, released openly to the public. This development highlights growing use of Rust in malware, posing new challenges for cybersecurity defenders.

Malware developers are increasingly turning to languages like Golang, Rust, and Nim, moving away from C and C++. This change allows them to compile malicious code for both Linux and Windows platforms with few adjustments. Among recent threats, Luca Stealer stands out as a Rust-built information stealer that has surfaced in the wild, appearing alongside dangers like BlackCat ransomware.

Rust's role in malware is still nascent compared to Golang but is growing quickly. Luca Stealer's public open-source release offers researchers a chance to examine Rust's application in harmful software, aiding in the creation of better defenses. However, this shift demands fresh approaches to analyze and reverse-engineer these advanced binaries.

Defenders face hurdles with Rust executables. Unlike C programs, Rust strings lack null termination, leading tools like Ghidra to misread data and create overlapping definitions. Analysts often need to manually adjust code bytes and redefine strings for accurate analysis. Locating the main function also requires understanding Rust compiler outputs; the entry point sets up the environment before invoking std::rt::lang_start_internal, which links to the user's primary function via argument tracing.

Helpfully, Rust's Cargo build system leaves traces. Dependencies, or 'crates,' are statically linked, and patterns like 'cargo\registry' can expose libraries such as reqwest for HTTP operations. Debug sections might retain PDB paths, revealing details like the author's username or system directories. As Rust gains traction among threat actors, grasping these traits is vital for detection efforts.

संबंधित लेख

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

AI द्वारा रिपोर्ट किया गया

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

AI द्वारा रिपोर्ट किया गया

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए विश्लेषण के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें