Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

1-inch rollout expanded bug bounty features rewards up to $500,000

Why Wall Street is actually high after the US bombing Iran

Over 1 million people now have access to Gen-AI-powered Alexa+

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new BPFDOOR controller allows stealth lateral movement in Linux server attacks
Identity

The new BPFDOOR controller allows stealth lateral movement in Linux server attacks

userBy userApril 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 16, 2025Ravi LakshmananCyberspy/Network Security

Lateral movement of Linux server attacks

Cybersecurity researchers unearthed a new controller component related to a known backdoor called BPFDOOR as part of a cyberattack targeting the telecommunications, finance and retail sectors of South Korea, Hong Kong, Myanmar, Malaysia and Egypt in 2024.

“The controller can open a reverse shell,” said Fernando Mercês of Trend Micro Researcher in a technical report released earlier this week. “This allows lateral movement, allowing attackers to enter a deeper compromised network, allowing them to control more systems and access sensitive data.

The campaign comes from a threat group that tracks it as DecisivearchItect, Red Dev 18, and Earth Bluecrow, also known as Red Menshen.

Cybersecurity

BPFDOOR is the Linux backdoor first revealed in 2022, and the malware is positioned as a long-term spy tool for use in attacks targeting Asian and Middle Eastern attacks, at least a year before public disclosure.

The most distinctive aspect of malware is that it creates a permanent cover channel for threat actors to control compromised workstations and access sensitive data over time.

The malware retrieves its name from the use of Berkeley Packet Filter (BPF). This comes from allowing the program to connect a network filter to an open socket to inspect incoming network packets and monitor specific magic byte sequences to work.

“Because of how BPF is implemented in targeted operating systems, magic packets cause backdoors despite being blocked by firewalls,” Merces said. “When a packet reaches the kernel’s BPF engine, the resident backdoor is activated. These features are common in rootkits, but are not usually seen in backdoors.”

A recent analysis from Trend Micro found that targeted Linux servers also infected previously undocumented malware controllers that are used to access other affected hosts on the same network after lateral movement.

“Before sending one of the ‘magic packets’ checked by the BPF filter inserted by the BPFDOOR malware, the controller asks the user for a password that will also be checked on the BPFDOOR side,” explained Mercês.

In the next step, the controller will instruct the compromised machine to perform one of the following actions based on the password provided and the command line options used –

Open a reverse shell Redirects a new connection to the shell on a specific port or verify that the backdoor is active

Cybersecurity

It is worth pointing out that the password sent from the controller must match one of the hardcoded values ​​in the BPFDOOR sample. In addition to supporting TCP, UDP, and ICMP protocols, controllers commanding infected hosts can also enable optional encryption mode for secure communication.

Additionally, the controller supports what is called direct mode, which allows an attacker to connect directly to the infected machine and get a shell for remote access, but only if he provides the appropriate password.

“BPF opens a new window of unexplored possibilities for malware authors to exploit,” Merces said. “As a threat researcher, it is essential to be equipped for future developments by analyzing BPF codes. This will help protect your organization from threats equipped with BPF.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTake a look inside Wing Security’s layered SaaS Identity Defense
Next Article Gaza ‘Great Tomb’ for Palestinians and those who help them: MSF | Israeli-Palestinian conflict news
user
  • Website

Related Posts

Echo Chamber Jailbreak Tricks LLMS To generate harmful content like Openai and Google

June 23, 2025

DHS warns Proilan hackers who are likely to target US networks after Iran’s nuclear attack

June 23, 2025

XDIGO Malware exploits Windows LNK flaws in Eastern European government attacks

June 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

1-inch rollout expanded bug bounty features rewards up to $500,000

Why Wall Street is actually high after the US bombing Iran

Over 1 million people now have access to Gen-AI-powered Alexa+

How much oil can go if Iran closes the Strait of Hormuz: Goldman

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

1-inch rollout expanded bug bounty features rewards up to $500,000

PhysicsX raises $135 million to bring AI-first engineering to aerospace, automobiles and energy

Deadline approach to speaker proposals for OpenSSL Conference 2025 held in Prague

AI Startup Snowcap raises $23 million in funding to build a superconducting chip that could surpass Nvidia

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.