A cyber security company explains about the new Linux malware 'Shikitega' with high stealthness



Researchers at cybersecurity firm

AT&T Alien Labs have uncovered a new breed of stealthy and sophisticated Linux malware that infects both traditional servers and small Internet of Things (IoT) devices. AT&T Alien Labs explains the threat, including how the malware, dubbed Shikitega by researchers, is difficult to detect.

Shikitega - New stealthy malware targeting Linux | AT&T Alien Labs
https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux

New Linux malware combines unusual stealth with a full suite of capabilities | Ars Technica
https://arstechnica.com/information-technology/2022/09/new-linux-malware-combines-unusual-stealth-with-a-full-suite-of-capabilities/

New Linux malware evades detection using multi-stage deployment
https://www.bleepingcomputer.com/news/security/new-linux-malware-evades-detection-using-multi-stage-deployment/

According to researchers, there are two main reasons why Shikitega is difficult to detect. First, it is polymorphic malware that encrypts itself with a different encryption key each time it is infected. This prevents detection using pattern matching that matches known viruses with suspected infected files. In addition, it seems that it is difficult to identify the source because it uses a legitimate cloud service to host a C2 server that serves as a stepping stone.



The primary dropper that creates and drops a file containing Shikitega's malicious code is a very small executable, just 376 bytes. The simple module delivered first is encoded by combining a multi-stage infection chain where each link downloads and executes the next link in response to part of the previous link. By using a polymorphic encoder during this distribution, it is difficult to capture the details of the malware.



Shikitega's C2 server responds with

shell commands that cause the target machine to perform program actions. In this way, the command is executed in the PC's memory, making it difficult to detect by the PC's antivirus protection, further increasing stealth.



Although the purpose of Shikitega as malware is not clear, researchers believe that one purpose is to send software for mining cryptocurrencies. However, in addition to that, webcam control and credential theft are also being carried out at the same time, and there are concerns that mining is not the only function of the malware and that it has other ultimate goals.

A research team at AT&T Alien Labs has reported a sharp increase in Linux malware since 2022, urging system administrators to ``apply available security updates and prevent threats on all endpoints''. Use EDR with continuous monitoring and regularly back up your most important data.”

in Security, Posted by log1e_dh