Rust-based Luca stealer targets Linux and Windows systems

Threat actors are shifting from traditional languages like C and C++ to modern ones such as Rust, enabling cross-platform malware development. A new Rust-based information stealer called Luca has emerged, released openly to the public. This development highlights growing use of Rust in malware, posing new challenges for cybersecurity defenders.

Malware developers are increasingly turning to languages like Golang, Rust, and Nim, moving away from C and C++. This change allows them to compile malicious code for both Linux and Windows platforms with few adjustments. Among recent threats, Luca Stealer stands out as a Rust-built information stealer that has surfaced in the wild, appearing alongside dangers like BlackCat ransomware.

Rust's role in malware is still nascent compared to Golang but is growing quickly. Luca Stealer's public open-source release offers researchers a chance to examine Rust's application in harmful software, aiding in the creation of better defenses. However, this shift demands fresh approaches to analyze and reverse-engineer these advanced binaries.

Defenders face hurdles with Rust executables. Unlike C programs, Rust strings lack null termination, leading tools like Ghidra to misread data and create overlapping definitions. Analysts often need to manually adjust code bytes and redefine strings for accurate analysis. Locating the main function also requires understanding Rust compiler outputs; the entry point sets up the environment before invoking std::rt::lang_start_internal, which links to the user's primary function via argument tracing.

Helpfully, Rust's Cargo build system leaves traces. Dependencies, or 'crates,' are statically linked, and patterns like 'cargo\registry' can expose libraries such as reqwest for HTTP operations. Debug sections might retain PDB paths, revealing details like the author's username or system directories. As Rust gains traction among threat actors, grasping these traits is vital for detection efforts.

Makala yanayohusiana

Illustration of Russian hackers using Linux VMs to hide malware on Windows systems, showing a computer screen with Hyper-V and malware elements in a dark setting.
Picha iliyoundwa na AI

Russian hackers use Linux VMs to hide malware on Windows

Imeripotiwa na AI Picha iliyoundwa na AI

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Building on Rust's new permanent status in the Linux kernel—following its history from 2019 experiments to the Tokyo Maintainers Summit approval—production deployments like Android 16's Rust allocator are live, alongside advanced drivers and safety gains, though criticisms highlight ongoing hurdles.

Imeripotiwa na AI

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Marking a historic shift after the 2025 Kernel Maintainer Summit's approval—detailed in our prior coverage on benchmarks and challenges—Rust is now a permanent fixture in the Linux kernel, with deep roots tracing back to 2019 and ambitious plans ahead.

Imeripotiwa na AI

Researchers at Check Point have revealed that VoidLink, a sophisticated Linux malware targeting cloud servers, was largely built by a single developer using AI tools. The framework, which includes over 30 modular plugins for long-term system access, reached 88,000 lines of code in under a week despite plans suggesting a 20-30 week timeline. This development highlights AI's potential to accelerate advanced malware creation.

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Imeripotiwa na AI

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Alhamisi, 8. Mwezi wa kwanza 2026, 07:18:04

China-linked UAT-7290 targets telecoms with Linux malware

Jumamosi, 27. Mwezi wa kumi na mbili 2025, 05:45:02

Ubuntu integrates Rust for enhanced security and AI optimization in 2025

Ijumaa, 26. Mwezi wa kumi na mbili 2025, 10:47:03

Rust in Linux Kernel: Full Integration, First Vulnerabilities, and 2025 Milestones

Jumatano, 17. Mwezi wa kumi na mbili 2025, 22:29:07

Rust in Linux Kernel: First Vulnerability Emerges in Android Binder Driver

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 19:38:20

Linux kernel Rust adoption: Benchmarks, challenges, and next steps

Ijumaa, 12. Mwezi wa kumi na mbili 2025, 11:54:38

CyberVolk launches VolkLocker ransomware targeting Linux and Windows

Jumatano, 10. Mwezi wa kumi na mbili 2025, 10:18:43

Linux kernel officially approves full Rust support

Jumatano, 29. Mwezi wa kumi 2025, 11:29:39

Malicious npm packages steal developer credentials on multiple platforms

Jumatano, 29. Mwezi wa kumi 2025, 07:35:36

New gentlemen's raas advertised on underground forums

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa