Close Menu
  • Identity
  • Startups
  • Tech
  • Spanish
What's Hot

AI Startup Snowcap raises $23 million in funding to build a superconducting chip that could surpass Nvidia

DHS warns Proilan hackers who are likely to target US networks after Iran’s nuclear attack

Senators urge FTC to investigate Spotify’s higher priced bundled subscriptions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Identity
  • Startups
  • Tech
  • Spanish
Fyself News
Home » The new BPFDOOR controller allows stealth lateral movement in Linux server attacks
Identity

The new BPFDOOR controller allows stealth lateral movement in Linux server attacks

userBy userApril 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 16, 2025Ravi LakshmananCyberspy/Network Security

Lateral movement of Linux server attacks

Cybersecurity researchers unearthed a new controller component related to a known backdoor called BPFDOOR as part of a cyberattack targeting the telecommunications, finance and retail sectors of South Korea, Hong Kong, Myanmar, Malaysia and Egypt in 2024.

“The controller can open a reverse shell,” said Fernando Mercês of Trend Micro Researcher in a technical report released earlier this week. “This allows lateral movement, allowing attackers to enter a deeper compromised network, allowing them to control more systems and access sensitive data.

The campaign comes from a threat group that tracks it as DecisivearchItect, Red Dev 18, and Earth Bluecrow, also known as Red Menshen.

Cybersecurity

BPFDOOR is the Linux backdoor first revealed in 2022, and the malware is positioned as a long-term spy tool for use in attacks targeting Asian and Middle Eastern attacks, at least a year before public disclosure.

The most distinctive aspect of malware is that it creates a permanent cover channel for threat actors to control compromised workstations and access sensitive data over time.

The malware retrieves its name from the use of Berkeley Packet Filter (BPF). This comes from allowing the program to connect a network filter to an open socket to inspect incoming network packets and monitor specific magic byte sequences to work.

“Because of how BPF is implemented in targeted operating systems, magic packets cause backdoors despite being blocked by firewalls,” Merces said. “When a packet reaches the kernel’s BPF engine, the resident backdoor is activated. These features are common in rootkits, but are not usually seen in backdoors.”

A recent analysis from Trend Micro found that targeted Linux servers also infected previously undocumented malware controllers that are used to access other affected hosts on the same network after lateral movement.

“Before sending one of the ‘magic packets’ checked by the BPF filter inserted by the BPFDOOR malware, the controller asks the user for a password that will also be checked on the BPFDOOR side,” explained Mercês.

In the next step, the controller will instruct the compromised machine to perform one of the following actions based on the password provided and the command line options used –

Open a reverse shell Redirects a new connection to the shell on a specific port or verify that the backdoor is active

Cybersecurity

It is worth pointing out that the password sent from the controller must match one of the hardcoded values ​​in the BPFDOOR sample. In addition to supporting TCP, UDP, and ICMP protocols, controllers commanding infected hosts can also enable optional encryption mode for secure communication.

Additionally, the controller supports what is called direct mode, which allows an attacker to connect directly to the infected machine and get a shell for remote access, but only if he provides the appropriate password.

“BPF opens a new window of unexplored possibilities for malware authors to exploit,” Merces said. “As a threat researcher, it is essential to be equipped for future developments by analyzing BPF codes. This will help protect your organization from threats equipped with BPF.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTake a look inside Wing Security’s layered SaaS Identity Defense
Next Article Gaza ‘Great Tomb’ for Palestinians and those who help them: MSF | Israeli-Palestinian conflict news
user
  • Website

Related Posts

DHS warns Proilan hackers who are likely to target US networks after Iran’s nuclear attack

June 23, 2025

XDIGO Malware exploits Windows LNK flaws in Eastern European government attacks

June 23, 2025

How AI-enabled workflow automation helps SOCs reduce burnout

June 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

AI Startup Snowcap raises $23 million in funding to build a superconducting chip that could surpass Nvidia

DHS warns Proilan hackers who are likely to target US networks after Iran’s nuclear attack

Senators urge FTC to investigate Spotify’s higher priced bundled subscriptions

XDIGO Malware exploits Windows LNK flaws in Eastern European government attacks

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

AI Startup Snowcap raises $23 million in funding to build a superconducting chip that could surpass Nvidia

BitMart’s R0AR List: $1R0R Makes CEX’s Debut

Gap 3 Partners FZCO will become Dubai’s first regulated virtual asset investment advisor with an operational license from VARA

Polemos has launched $PLMS tokens on MEXC and UNISWAP, moving forward with Web3 gaming infrastructure

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.