Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How to automate ticket creation, device identification, and threat triage with tines

Earth observation data benefits all Europe

Transport and mobility needs to change the approach to net zero

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Linux malware “Auto-Color” grants hackers full remote access to compromised systems
Identity

New Linux malware “Auto-Color” grants hackers full remote access to compromised systems

userBy userFebruary 26, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 26, 2025Ravi LakshmananLinux/Endpoint Security

According to new research from Palo Alto Networks Unit 42, universities and government agencies in North America and Asia are targeted by previously undocumented Linux malware, known as automatic color, from November to December 2024.

“Once installed, AutoColor allows threat actors to have full remote access to compromised machines, making it extremely difficult to remove without specialized software,” said security researcher Alex Armstrong. This is mentioned in a technical article about malware.

Cybersecurity

Auto-Color is named based on the file name, and the first payload changes post-installation changes. Currently, I don’t know how to reach the target, but what is known is that the victim must explicitly do it on a Linux machine.

A notable aspect of malware is the trick weapon used to avoid detection. This includes using seemingly ambiguous file names such as doors and eggs, hiding command and control (C2) connections, and utilizing proprietary encryption algorithms to mask communication and configuration information.

When released with root privileges, it installs a malicious library implant named “libcext.so.2”. “To establish host persistence.

“If the current user does not have root privileges, the malware will not proceed with the installation of the evasion library implants on the system,” Armstrong said. “Without this library, you’ll be doing as much as possible in the next stage.”

Library implants are passively equipped with hook functionality used in LIBC and are used to intercept Open() system calls. This hides C2 communication by modifying “/Proc/Net/TCP” which contains information about all active network connections. A similar technique was adopted by another Linux malware called Symbiote.

Cybersecurity

It also prevents malware uninstallation by protecting “/etc/ld.preload” against further changes or deletion.

Auto-Color then contacts the C2 server, generates a reverse shell for the operator, collects system information, creates or modify files, runs programs, and proxy communications between remote IP addresses and specific communications grants the ability to use the machine as You can also target an IP address and uninstall itself using the kill switch.

“At runtime, the malware attempts to receive remote instructions from a command server that can create a reverse shell backdoor on the victim’s system,” Armstrong said. “Threat actors use their own algorithms to individually compile and encrypt each command server IP.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article3 Password Crack Techniques and How to Protect them
Next Article Nomagic wins $44 million for an AI-powered robot arm
user
  • Website

Related Posts

How to automate ticket creation, device identification, and threat triage with tines

July 9, 2025

Chinese hacker Xu Zewei has been arrested for linking between silk typhoon groups and US cyberattacks

July 9, 2025

Includes Microsoft Patch 130 vulnerabilities, important flaws in SPNEGO and SQL Server

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How to automate ticket creation, device identification, and threat triage with tines

Earth observation data benefits all Europe

Transport and mobility needs to change the approach to net zero

Chinese hacker Xu Zewei has been arrested for linking between silk typhoon groups and US cyberattacks

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.