Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Nothing’s retro-looking Headphone 1 are already $30 off

    August 20, 2025

    Windows Copilot Vision: Can this AI app actually help you?

    August 20, 2025

    Hundreds of Thousands of User Chats with AI Chatbot Grok Are Now Public

    August 20, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Nothing’s retro-looking Headphone 1 are already $30 off
    • Windows Copilot Vision: Can this AI app actually help you?
    • Hundreds of Thousands of User Chats with AI Chatbot Grok Are Now Public
    • The Pixel 10 devices support Qi2 with built-in magnets, here are the official accessories
    • Nothing Beats Our Editors’ Favorite Office Chair, and It’s on Sale Now
    • Bloodlines fans rage as Paradox locks 2 playable clans behind $30 DLC: ‘Is Paradox smoking crack?’
    • YouTube is now giving free users a Premium perk
    • Government Staffing Cuts Have Fueled an Ant-Smuggling Boom
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»AI & Tech»A clever new Linux malware is breaking into systems – and then shutting the door behind it to avoid detection
    AI & Tech

    A clever new Linux malware is breaking into systems – and then shutting the door behind it to avoid detection

    techupdateadminBy techupdateadminAugust 20, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A hacker typing on a MacBook laptop with code on the screen.
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Researchers spot cybercriminals abuse bug to access a cloud Linux server
    • The hackers then proceeded to patch the flaw, closing the doors behind them
    • There could be different reasons for fixing flaws

    A hacker was recently spotted patching someone’s vulnerable cloud Linux instance – but they did not do it out of the goodness of their heart.

    Security researchers Red Canary observed a threat actor abusing a maximum severity flaw, tracked as CVE-2023-46604, to break into a cloud Linux system.

    The vulnerability is found in Apache ActiveMQ, and grants persistent access, among other things – but however, after breaking in, they patched the bug, essentially locking the doors behind them.


    You may like

    DripDropper

    Red Canary argues that there are different reasons why a cybercriminal might fix a problem after exploiting it, including locking out other adversaries, or hiding their tracks.

    The latter makes a lot of sense, especially knowing that cybercriminals often fight for control over different compromised endpoints.

    Besides patching the flaw, the hackers did a number of things, including installing the Sliver implant, which granted them unrestricted access to the system.

    They also modified the existing sshd configuration file to enable root login, and after that installed a previously unknown downloader that Red Canary named “DripDropper”.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The downloader itself is rather advanced, requiring a password to run, which hinders sandbox analysis.

    It communicates with the threat actors via a Dropbox account that has hardcoded bearer tokens, and since Dropbox and similar platforms (Telegram, or Discord) are not malicious by nature, the traffic blends in and is harder to spot. Finally, DripDropper is most likely used to deploy two separate pieces of malware.

    Red Canary says that vulnerable web servers are one of the most common initial access vectors to Linux systems.

    “Given the prevalence of *NIX-based, or Unix-like systems in modern infrastructure, particularly in rapidly expanding cloud environments, ensuring they’re protected is essential,” the researchers said.

    “This requires the development of specialized incident response strategies tailored to the complexities of both cloud architectures and Linux environments and ensuring defenders are equipped with effective, actionable guidance to safeguard these critical assets.”

    You might also like

    Avoid breaking Clever Detection Door Linux malware shutting Systems
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article52 of the Best TV Shows on Netflix That Will Keep You Entertained
    Next Article Nvidia supercharges RTX 40 cards with two performance-boosting features
    techupdateadmin
    • Website

    Related Posts

    AI & Tech

    Windows Copilot Vision: Can this AI app actually help you?

    August 20, 2025
    AI & Tech

    Did a Human Write That? Detect AI Writing With These Tips

    August 20, 2025
    AI & Tech

    Logitech gave Harmony remote users less than a day to install crucial update

    August 20, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Apple Pencil With ‘Trackball’ Tip, Ability to Draw on Any Surface Described in Patent Document

    July 9, 20253 Views

    Samsung Galaxy Z Fold 7 and Galaxy Z Flip 7: First Impressions

    July 9, 20253 Views

    The Bezos-funded climate satellite is lost in space

    July 9, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    Nothing’s retro-looking Headphone 1 are already $30 off

    August 20, 2025

    Windows Copilot Vision: Can this AI app actually help you?

    August 20, 2025

    Hundreds of Thousands of User Chats with AI Chatbot Grok Are Now Public

    August 20, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.