Lucene search

K
thnThe Hacker NewsTHN:AE7D0A7BB982C59186CA19844F31C910
HistorySep 07, 2022 - 12:38 p.m.

New Stealthy Shikitega Malware Targeting Linux Systems and IoT Devices

2022-09-0712:38:00
The Hacker News
thehackernews.com
26

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

New Stealthy Shikitega Malware

A new piece of stealthy Linux malware called Shikitegahas been uncovered adopting a multi-stage infection chain to compromise endpoints and IoT devices and deposit additional payloads.

“An attacker can gain full control of the system, in addition to the cryptocurrency miner that will be executed and set to persist,” AT&T Alien Labs said in a new report published Tuesday.

The findings add to a growing list of Linux malware that has been found in the wild in recent months, including BPFDoor, Symbiote, Syslogk, OrBit, and Lightning Framework.

Once deployed on a targeted host, the attack chain downloads and executes the Metasploit’s “Mettle” meterpreter to maximize control, exploits vulnerabilities to elevate its privileges, adds persistence on the host via crontab, and ultimately launches a cryptocurrency miner on infected devices.

The exact method by which the initial compromise is achieved remains unknown as yet, but what makes Shikitega evasive is its ability to download next-stage payloads from a command-and-control (C2) server and execute them directly in memory.

New Stealthy Shikitega Malware

Privilege escalation is achieved by means of exploiting CVE-2021-4034 (aka PwnKit) and CVE-2021-3493, enabling the adversary to abuse the elevated permissions to fetch and execute the final stage shell scripts with root privileges to establish persistence and deploy the Monero crypto miner.

In a further attempt to fly under the radar, the malware operators employ a “Shikata ga nai” polymorphic encoder to make it more difficult to detect by antivirus engines and abuse legitimate cloud services for C2 functions.

Shikitega is also indicative of a trend toward malicious actors expanding their attack reach to accommodate the Linux operating system that’s widely used in cloud platforms and servers across the world.

According to Trend Micro 2022 Midyear Cybersecurity Report, “the emergence of these new Linux ransomware families directly corresponds to […] a 75% increase in ransomware attacks targeting Linux systems in the first half of 2022 compared to the first half of 2021.”

“Threat actors continue to search for ways to deliver malware in new ways to stay under the radar and avoid detection,” AT&T Alien Labs researcher Ofer Caspi said.

“Shiketega malware is delivered in a sophisticated way, it uses a polymorphic encoder, and it gradually delivers its payload where each step reveals only part of the total payload.”

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C