Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The real reason Google DeepMind partners with fusion energy startups

A new wave of social media apps brings hope to a world of doomscrolling

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New Linux malware “Auto-Color” grants hackers full remote access to compromised systems
Identity

New Linux malware “Auto-Color” grants hackers full remote access to compromised systems

userBy userFebruary 26, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 26, 2025Ravi LakshmananLinux/Endpoint Security

According to new research from Palo Alto Networks Unit 42, universities and government agencies in North America and Asia are targeted by previously undocumented Linux malware, known as automatic color, from November to December 2024.

“Once installed, AutoColor allows threat actors to have full remote access to compromised machines, making it extremely difficult to remove without specialized software,” said security researcher Alex Armstrong. This is mentioned in a technical article about malware.

Cybersecurity

Auto-Color is named based on the file name, and the first payload changes post-installation changes. Currently, I don’t know how to reach the target, but what is known is that the victim must explicitly do it on a Linux machine.

A notable aspect of malware is the trick weapon used to avoid detection. This includes using seemingly ambiguous file names such as doors and eggs, hiding command and control (C2) connections, and utilizing proprietary encryption algorithms to mask communication and configuration information.

When released with root privileges, it installs a malicious library implant named “libcext.so.2”. “To establish host persistence.

“If the current user does not have root privileges, the malware will not proceed with the installation of the evasion library implants on the system,” Armstrong said. “Without this library, you’ll be doing as much as possible in the next stage.”

Library implants are passively equipped with hook functionality used in LIBC and are used to intercept Open() system calls. This hides C2 communication by modifying “/Proc/Net/TCP” which contains information about all active network connections. A similar technique was adopted by another Linux malware called Symbiote.

Cybersecurity

It also prevents malware uninstallation by protecting “/etc/ld.preload” against further changes or deletion.

Auto-Color then contacts the C2 server, generates a reverse shell for the operator, collects system information, creates or modify files, runs programs, and proxy communications between remote IP addresses and specific communications grants the ability to use the machine as You can also target an IP address and uninstall itself using the kill switch.

“At runtime, the malware attempts to receive remote instructions from a command server that can create a reverse shell backdoor on the victim’s system,” Armstrong said. “Threat actors use their own algorithms to individually compile and encrypt each command server IP.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article3 Password Crack Techniques and How to Protect them
Next Article Nomagic wins $44 million for an AI-powered robot arm
user
  • Website

Related Posts

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

October 16, 2025

Hackers exploit blockchain smart contracts to spread malware via infected WordPress sites

October 16, 2025

LinkPro Linux rootkit uses eBPF to hide and activate via Magic TCP packets

October 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The real reason Google DeepMind partners with fusion energy startups

A new wave of social media apps brings hope to a world of doomscrolling

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

Hackers exploit blockchain smart contracts to spread malware via infected WordPress sites

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.