WolfsBane infiltrates targets through a dropper called “cron” that disguises the installer as a KDE desktop component. It can disable SELinux, change user configuration, and create persistent system services. The backdoor component ‘udevd’ loads encrypted libraries to facilitate command and control (C2) communication. Experts say the modified BEURK rootkit is used to hide malicious processes and network activity.

This development underlines the increasing trend of hackers shifting their focus to Linux due to increased Windows security; Threats increasingly target Linux platforms, especially those that access the Internet.

Source: Ferra

Previous articleDermatovenerologist explained what red moles mean Fitness and health 24 November 2024 05:00
Next article“Russian hackers” hacked an American company using their neighbors’ Wi-FiAttachmentsNovember 24, 2024, 06:00
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here