SecurNerd
    What's Hot

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    SecurNerd
    • Home
    • AI
    • General News
    • Science
    • Tech
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    SecurNerd
    Home»Cyber Attacks»Reptile Rootkit: The Linux Menace Unleashed on South Korean Computer Systems
    Cyber Attacks

    Reptile Rootkit: The Linux Menace Unleashed on South Korean Computer Systems

    securnerdBy securnerdAugust 8, 2023Updated:August 8, 202303 Mins Read39 Views
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Reddit Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    South Korea faces a new cyber threat as hackers utilize an open-source rootkit known as Reptile to breach Linux systems.

    A report published this week by AhnLab Security Emergency Response Center (ASEC) reveals that Reptile is a complex rootkit malware that offers a reverse shell, enabling attackers to gain unauthorized control of infected systems. Unlike conventional rootkit malware, which usually hides its activities, Reptile takes a more invasive approach.

    ASEC explains a technique known as “port knocking,” where the malware opens a specified port on the affected system and awaits a particular packet, known as a “magic packet,” from the threat actor. This enables a connection with the command-and-control (C&C) server.

    Reptile, a malicious software designed to gain privileged root-level access to a machine, has been deployed in at least four different instances since 2022.

    It was first associated with an Earth Berberoka intrusion (also called GamblingPuppet) by Trend Micro in May 2022. This specific attack targeted gambling sites in China, using the malware to mask connections and processes related to a Python trojan named Pupy RAT.

    In March 2023, Google’s Mandiant uncovered a series of attacks by a possible China-linked entity known as UNC3886, exploiting zero-day vulnerabilities in Fortinet devices to distribute Reptile along with custom implants.

    Furthermore, ExaTrack exposed a Chinese hacking team’s utilization of Linux malware called Mélofée, based on Reptile, in the same month. Microsoft found a cryptojacking operation in June 2023 that used Reptile to hide its activities.

    A more in-depth investigation into Reptile shows a loader that employs a tool called kmatryoshka, which decrypts and loads the rootkit’s kernel module into memory, subsequently opening a specific port and waiting for a magic packet.

    ASEC highlighted the mechanism of using magic packets to trigger the malicious behavior, which has similarities with another rootkit, Syslogk, detailed by Avast in the past.

    Reptile’s effects in South Korea include cases involving Mélofée-like tactics. ASEC describes Reptile as “a Linux kernel mode rootkit malware that provides a concealment feature for files, directories, processes, and network communications.” This rootkit’s reverse shell feature also makes affected systems prone to takeover by attackers.

    This news comes on the heels of recent discoveries of multiple new variants of an elusive Linux backdoor known as BPFDoor, attributed to a Chinese threat actor codenamed Red Menshen (also referred to as DecisiveArchitect or Red Dev 18). Trend Micro notes a six-fold enhancement in BPFDoor’s instructions, indicating its continued success and development.

    The presence of Reptile and the rapid evolution of other threats like BPFDoor signal a growing need for robust security measures against increasingly sophisticated Linux-targeting malware.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    securnerd
    • Website
    • Facebook
    • Twitter
    • Instagram

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Related Posts

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023

    APT Campaign Unveils New ‘HrServ.dll’ Web Shell Targeting Afghan Government Systems

    November 26, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Top Posts

    Apple Takes Stand Against U.K. Surveillance Proposals, Considers Withdrawal of iMessage and FaceTime Services

    July 22, 20232,637 Views

    Apple’s Market Value Skyrockets by $71 Billion Amid Speculation of In-house ‘Apple GPT’ to Challenge OpenAI

    July 23, 2023894 Views

    Android Malware Developers Utilize Stealthy APK Compression to Bypass Detection Measures

    August 20, 2023810 Views

    Apple Store Blocks Twitter’s iOS App Rebranding to ‘X’ Due to Minimum Character Regulations

    July 29, 2023760 Views
    Don't Miss
    2 Mins Read

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    By securnerdDecember 8, 2023

    Google recently unveiled Gemini, its latest suite of powerful AI models, but the tech giant…

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 2023
    Stay In Touch
    • Facebook
    • Twitter
    • Instagram
    • LinkedIn
    • Telegram
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Google just launched a new AI and has already admitted at least one demo wasn’t real

    December 8, 2023

    BLUFFS Bluetooth Vulnerabilities Open Door to Adversary-in-the-Middle Threats

    December 5, 2023

    Qilin Ransomware’s Latest Variant Targets VMware ESXi Servers with Advanced Linux Encryptor

    December 4, 2023
    Popular Post

    Microsoft’s Ongoing Struggles with Cybersecurity: A $2.4 Trillion Giant’s Failures

    September 23, 20231 Views

    Ukrainian Authorities Detect Russian Hacker Campaign Seeking Evidence of War Crimes

    September 25, 20231 Views

    Zyxel Addresses 15 Security Vulnerabilities Across NAS, Firewall, and AP Devices with Latest Patches

    December 1, 20231 Views

    Ethos Technologies Data Breach Settlement Offers Compensation of Up to $5,200 for Affected Individuals

    September 23, 20232 Views

    New Sophisticated and Modular ‘Deadglyph’ Malware Unleashed in Government Cyberattacks

    September 24, 20232 Views

    Nigerian Man Admits Guilt in $6 Million Business Email Compromise Scheme

    September 24, 20233 Views

    Microsoft Unveils Security Copilot Early Access Program, Revolutionizing Threat Response

    October 23, 20233 Views

    Meta Introduces Ad-Free Subscriptions in Europe, Adapting to Privacy Regulations

    October 31, 20234 Views

    Ukraine Enhances Wartime Efforts Through Advanced Cyber Intelligence Strategies

    August 10, 20235 Views

    Critical Security Flaws Exposed in Nagios XI Network Monitoring Software

    September 20, 20235 Views
    Facebook Twitter Instagram LinkedIn Telegram
    © 2023 SecurNerd. Powered by Codelivly.

    Type above and press Enter to search. Press Esc to cancel.