New SysUpdate malware variant targets Linux systems

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

The SysUpdate malware variant emerged as a sophisticated threat to Linux environments, detected by LevelBlue analysts during a Digital Forensics and Incident Response (DFIR) engagement. The suspicious Linux binary appeared in a client's system, identified as a packed ELF64 executable using an unknown obfuscated packer without section headers, complicating traditional analysis.

Upon execution without specific arguments, the malware runs the GNU/Linux ID command to collect system information and then initiates encrypted network communications over multiple protocols. LevelBlue's dynamic analysis and endpoint detection metrics revealed strong indicators linking it to a new SysUpdate version, confirmed with high confidence through reverse engineering. The malware's C++ codebase employs complex cryptographic routines to encrypt command-and-control (C2) traffic, hindering network-based detection.

To counter this, researchers developed a decryption tool using the Unicorn Engine emulation framework during the active incident. This tool extracts machine code bytes, global data structures, heap values, and CPU register states from the malware sample. It emulates key generation from a hardcoded plaintext encryption key in the heap and decrypts 8-byte data blocks via XOR operations with an unknown algorithm, replicating the malware's memory mappings including stack, heap, data segments, and code.

The methodology integrates Binary Ninja for static analysis, GDB for dynamic debugging, and Rust-based Unicorn Engine bindings for x86-64 emulation, bypassing full reverse engineering of the cryptography. This approach enables decryption of C2 traffic for current and future variants by extracting new encryption keys.

LevelBlue recommends organizations deploy endpoint detection solutions to monitor packed ELF executables mimicking system services, conduct network traffic analysis for encrypted patterns, and prepare incident response with malware emulation capabilities.

Articoli correlati

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Immagine generata dall'IA

Researchers discover SSHStalker botnet infecting Linux servers

Riportato dall'IA Immagine generata dall'IA

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Riportato dall'IA

Security researchers at Cyble have discovered a new Linux malware called ClipXDaemon, which hijacks cryptocurrency wallet addresses by altering clipboard content on X11-based systems. The malware operates without command-and-control servers, monitoring and replacing addresses in real time to redirect funds to attackers. It uses a multi-stage infection process and employs stealth techniques to evade detection.

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

Riportato dall'IA

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta