Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

EU’s energy-intensive industries reduce emissions, but momentum slows

Malicious npm package collects cryptographic keys, CI secrets, and API tokens

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The new BPFDOOR controller allows stealth lateral movement in Linux server attacks
Identity

The new BPFDOOR controller allows stealth lateral movement in Linux server attacks

userBy userApril 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 16, 2025Ravi LakshmananCyberspy/Network Security

Lateral movement of Linux server attacks

Cybersecurity researchers unearthed a new controller component related to a known backdoor called BPFDOOR as part of a cyberattack targeting the telecommunications, finance and retail sectors of South Korea, Hong Kong, Myanmar, Malaysia and Egypt in 2024.

“The controller can open a reverse shell,” said Fernando Mercês of Trend Micro Researcher in a technical report released earlier this week. “This allows lateral movement, allowing attackers to enter a deeper compromised network, allowing them to control more systems and access sensitive data.

The campaign comes from a threat group that tracks it as DecisivearchItect, Red Dev 18, and Earth Bluecrow, also known as Red Menshen.

Cybersecurity

BPFDOOR is the Linux backdoor first revealed in 2022, and the malware is positioned as a long-term spy tool for use in attacks targeting Asian and Middle Eastern attacks, at least a year before public disclosure.

The most distinctive aspect of malware is that it creates a permanent cover channel for threat actors to control compromised workstations and access sensitive data over time.

The malware retrieves its name from the use of Berkeley Packet Filter (BPF). This comes from allowing the program to connect a network filter to an open socket to inspect incoming network packets and monitor specific magic byte sequences to work.

“Because of how BPF is implemented in targeted operating systems, magic packets cause backdoors despite being blocked by firewalls,” Merces said. “When a packet reaches the kernel’s BPF engine, the resident backdoor is activated. These features are common in rootkits, but are not usually seen in backdoors.”

A recent analysis from Trend Micro found that targeted Linux servers also infected previously undocumented malware controllers that are used to access other affected hosts on the same network after lateral movement.

“Before sending one of the ‘magic packets’ checked by the BPF filter inserted by the BPFDOOR malware, the controller asks the user for a password that will also be checked on the BPFDOOR side,” explained Mercês.

In the next step, the controller will instruct the compromised machine to perform one of the following actions based on the password provided and the command line options used –

Open a reverse shell Redirects a new connection to the shell on a specific port or verify that the backdoor is active

Cybersecurity

It is worth pointing out that the password sent from the controller must match one of the hardcoded values ​​in the BPFDOOR sample. In addition to supporting TCP, UDP, and ICMP protocols, controllers commanding infected hosts can also enable optional encryption mode for secure communication.

Additionally, the controller supports what is called direct mode, which allows an attacker to connect directly to the infected machine and get a shell for remote access, but only if he provides the appropriate password.

“BPF opens a new window of unexplored possibilities for malware authors to exploit,” Merces said. “As a threat researcher, it is essential to be equipped for future developments by analyzing BPF codes. This will help protect your organization from threats equipped with BPF.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTake a look inside Wing Security’s layered SaaS Identity Defense
Next Article Gaza ‘Great Tomb’ for Palestinians and those who help them: MSF | Israeli-Palestinian conflict news
user
  • Website

Related Posts

Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

February 23, 2026

Malicious npm package collects cryptographic keys, CI secrets, and API tokens

February 23, 2026

MuddyWater uses GhostFetch, CHAR, HTTP_VIP to target MENA organizations

February 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

EU’s energy-intensive industries reduce emissions, but momentum slows

Malicious npm package collects cryptographic keys, CI secrets, and API tokens

EU invests €225 million to deliver next-generation influenza vaccines

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.