Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 11’s built-in screen recording can target specific windows soon

    August 20, 2025

    ROG Xbox Ally Launches Oct. 16: ‘Handheld Compatibility’ Tags Will Manage Expectations

    August 20, 2025

    Verizon deal: $400 off Samsung or free NFL Sunday Ticket

    August 20, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Windows 11’s built-in screen recording can target specific windows soon
    • ROG Xbox Ally Launches Oct. 16: ‘Handheld Compatibility’ Tags Will Manage Expectations
    • Verizon deal: $400 off Samsung or free NFL Sunday Ticket
    • Made by Google 2025: The Biggest Pixel 10 Leaks We’ve Heard As Launch Arrives
    • Logitech gave Harmony remote users less than a day to install crucial update
    • Hyperkin’s DualSense-inspired Xbox controller is launching this fall
    • Upgrading to Smart Lights? Here Are 6 Tips for Buying the Perfect Bulbs
    • Nvidia supercharges RTX 40 cards with two performance-boosting features
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»AI & Tech»A clever new Linux malware is breaking into systems – and then shutting the door behind it to avoid detection
    AI & Tech

    A clever new Linux malware is breaking into systems – and then shutting the door behind it to avoid detection

    techupdateadminBy techupdateadminAugust 20, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A hacker typing on a MacBook laptop with code on the screen.
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Researchers spot cybercriminals abuse bug to access a cloud Linux server
    • The hackers then proceeded to patch the flaw, closing the doors behind them
    • There could be different reasons for fixing flaws

    A hacker was recently spotted patching someone’s vulnerable cloud Linux instance – but they did not do it out of the goodness of their heart.

    Security researchers Red Canary observed a threat actor abusing a maximum severity flaw, tracked as CVE-2023-46604, to break into a cloud Linux system.

    The vulnerability is found in Apache ActiveMQ, and grants persistent access, among other things – but however, after breaking in, they patched the bug, essentially locking the doors behind them.


    You may like

    DripDropper

    Red Canary argues that there are different reasons why a cybercriminal might fix a problem after exploiting it, including locking out other adversaries, or hiding their tracks.

    The latter makes a lot of sense, especially knowing that cybercriminals often fight for control over different compromised endpoints.

    Besides patching the flaw, the hackers did a number of things, including installing the Sliver implant, which granted them unrestricted access to the system.

    They also modified the existing sshd configuration file to enable root login, and after that installed a previously unknown downloader that Red Canary named “DripDropper”.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    The downloader itself is rather advanced, requiring a password to run, which hinders sandbox analysis.

    It communicates with the threat actors via a Dropbox account that has hardcoded bearer tokens, and since Dropbox and similar platforms (Telegram, or Discord) are not malicious by nature, the traffic blends in and is harder to spot. Finally, DripDropper is most likely used to deploy two separate pieces of malware.

    Red Canary says that vulnerable web servers are one of the most common initial access vectors to Linux systems.

    “Given the prevalence of *NIX-based, or Unix-like systems in modern infrastructure, particularly in rapidly expanding cloud environments, ensuring they’re protected is essential,” the researchers said.

    “This requires the development of specialized incident response strategies tailored to the complexities of both cloud architectures and Linux environments and ensuring defenders are equipped with effective, actionable guidance to safeguard these critical assets.”

    You might also like

    Avoid breaking Clever Detection Door Linux malware shutting Systems
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article52 of the Best TV Shows on Netflix That Will Keep You Entertained
    Next Article Nvidia supercharges RTX 40 cards with two performance-boosting features
    techupdateadmin
    • Website

    Related Posts

    AI & Tech

    Logitech gave Harmony remote users less than a day to install crucial update

    August 20, 2025
    AI & Tech

    CNET Survey Finds Adults Spend $3,000 a Year on Takeout and Restaurants. Meal Kits Could Be a Cheaper Option

    August 20, 2025
    AI & Tech

    These 200+ Alexa Commands Changed the Way I Use My Echo Devices

    August 20, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Apple Pencil With ‘Trackball’ Tip, Ability to Draw on Any Surface Described in Patent Document

    July 9, 20253 Views

    Samsung Galaxy Z Fold 7 and Galaxy Z Flip 7: First Impressions

    July 9, 20253 Views

    The Bezos-funded climate satellite is lost in space

    July 9, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    Windows 11’s built-in screen recording can target specific windows soon

    August 20, 2025

    ROG Xbox Ally Launches Oct. 16: ‘Handheld Compatibility’ Tags Will Manage Expectations

    August 20, 2025

    Verizon deal: $400 off Samsung or free NFL Sunday Ticket

    August 20, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.