About Us

We must explain to you how all seds this mistakens idea off denouncing pleasures and praising pain was born and I will give you a completed accounts of the system and expound.

Contact Info

123/A, Miranda City Likaoli Prikano, Dope United States

+0989 7876 9865 9

info@example.com

Malware Campaign Targets Linux Systems

Malware Campaign Targets Linux Systems

Linux systems are under attack by a malware campaign to mine Monero (XMR), a privacy-centric coin. It uses a new version of Shellbot trojan to bridge a tunnel between the infected system and a C&C server, which is operated by the attackers.

Jask Special Ops researchers described the Shellbot as an Internet Relay Chat (IRC) botnet. It is distributed through common command injection vulnerabilities. According to Cyware, “the researchers noted that the trojan targets vulnerable Linux servers as well as the Internet of Things (IoT) devices.” It can also infect Windows OS and android devices. “Once the servers of the targeted organizations are compromised, the threat group adds a botnet to strengthen its campaign, the botnet is detected as the new version of Shellbot trojan,” says the Cyware.

The Shellbot trojan is capable of downloading additional payloads, collecting system and personal data, opening remote command line shells, receiving additional payloads from controllers, and terminating or running tasks and processes. It can also send stolen information to a C&C server.

Linux’s official portal stated that “the backdoor is able to collect system and personal data, terminate or run tasks and processes, download additional payloads, open remote command line shells, send stolen information to a C2 and also receive additional malware payloads from controllers.” It further highlighted that threat actors target organizations through denial-of-service (DoS) and SSH brute-force techniques.

The same group had been behind the November attacks, whereby it compromised the FTP server of a Japanese art organization and a Bangladesh government website. Researchers and experts are keeping a look out for the Shellbot trojan because its evolving and the C2 server is very much active.

Carolyn Conrad

Carolyn Conrad has recently joined CryptoLighty news reporting team as a full-time reporter. She has been curating and writing for leading cryptocurrencies from last five years. She holds post graduate diploma in finance. She also holds year long experience in digital print media.

Leave a Reply