Researchers uncover new SysUpdate malware variant targeting Linux

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

During a digital forensics and incident response (DFIR) engagement, researchers at LevelBlue discovered a new variant of the SysUpdate malware specifically targeting Linux systems. This finding was reported on February 19, 2026. The malware sample presents as a packed ELF64 binary written in C++, dynamically linked without section headers, and protected by an unknown obfuscated packer.

To mimic a legitimate system service, the malware executes the Linux 'id' command and displays user details when launched without specific arguments. Its network activity includes encrypted command-and-control (C2) communications over multiple protocols. Analysis linked this variant to the original SysUpdate, previously tied to the APT27 group, also known as Iron Tiger.

The LevelBlue team employed tools such as Binary Ninja for decompilation, GDB for debugging, and the Unicorn Engine with Rust bindings for emulation. Static analysis revealed cryptographic constants and dense bitwise operations, with key functions including 'generate_key'—which performs 64 iterations via 'generate_key_internal'—'xor_and_UNK_1' for encryption and decryption using XOR with keys on 8-byte aligned buffers, and 'i_am_clearly_encryption_UNK' featuring S-box-like data and constants like 0xf0f0f0f.

To counter the C2 encryption, researchers emulated the malware's routines using the Unicorn Engine, mapping original memory segments including stack at 0x7ffffffde000, unknown data at 0x4fd000, heap at 0x1393000, and code segments. They used a plaintext key of “!2#4Wx62” to generate a 132-byte key saved as 'gend_key.bin'. The decryption emulator handled encrypted inputs from traffic, such as 168-byte payloads, successfully decrypting C2 data by executing routines like 'xor_and_UNK_1' with a decrypt flag.

LevelBlue noted that this approach enables rapid decryption in live incidents without complete reverse engineering, effectively using the adversary's code against itself. The evolution of SysUpdate to Linux underscores cross-platform threats from groups like Iron Tiger. Organizations are advised to watch for anomalous ELF binaries that imitate services and unusual encrypted network flows.

Makala yanayohusiana

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Picha iliyoundwa na AI

Researchers discover SSHStalker botnet infecting Linux servers

Imeripotiwa na AI Picha iliyoundwa na AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Imeripotiwa na AI

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Researchers have attributed a failed cyberattack on Poland's electric grid to Russian state hackers, coinciding with the 10th anniversary of a similar assault on Ukraine. The wiper malware aimed to disrupt power distribution but did not succeed in knocking out electricity. Security firm ESET linked the incident to the notorious Sandworm group.

Imeripotiwa na AI

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

Jumatano, 18. Mwezi wa tatu 2026, 03:20:19

Infostealers Disguised as Claude Code, OpenClaw, and Other AI Tools

Jumatatu, 9. Mwezi wa tatu 2026, 15:31:11

Researchers identify ClipXDaemon malware targeting Linux cryptocurrency users

Jumatatu, 2. Mwezi wa tatu 2026, 17:37:21

IPFire 2.29 core update 200 introduces Linux kernel 6.18 LTS

Alhamisi, 26. Mwezi wa pili 2026, 01:40:05

The hacker news publishes weekly threatsday bulletin

Jumatatu, 23. Mwezi wa pili 2026, 08:01:15

Malicious npm packages harvest crypto keys and secrets

Jumanne, 10. Mwezi wa pili 2026, 19:39:23

New Linux botnet SSHStalker uses IRC for command-and-control

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Jumatano, 21. Mwezi wa kwanza 2026, 05:18:40

AI-assisted VoidLink malware framework targets Linux cloud servers

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa