How deadly the malware is warns Researchers. Linux malware variant offers advanced features and evasion mechanisms
PSA stealer malware affected more then 4,000 computers in 62 countries
A brand new malware related to Linux been found infecting thousands of computers around the world, stealing people’s login credentials, payment information and browser cookies, warns security researchers from SentinelLabs and Beazley Security. More than 4,000 computers were infected with PSA Stealer in 62 countries, the two companies said, suggesting that the campaign is rather successful.
As per researcher PSA Stealer is apparently being distributed through phishing emails and malicious landing pages. The malicious attachments contain a legitimate program (such as a PDF reader) and a weaponized DLL. The program sideloads the DLL, successfully deploying the malware while not raising any alarms.
More than 4,000 computers were infected with PSA Stealer in 62 countries, the two companies said, suggesting that the campaign is rather successful.
The joint report detailing the activities of PXA Stealer, a new Python-based infostealer for the Linux platform. Spotted in late 2024, and has since grown into a formidable threat, successfully evading defense tools while wreaking havoc across the globe.
Key pointers on installing the applications /malware (Side Loading)
The malware PSA can target browser extensions for various crypto wallets, including Exodus, Magic Eden, Crypto.com and many more
Can pull data from sites such as Coinbase, Kraken, and PayPal.
Finally, it can inject a DLL into running browser instances to bypass encryption mechanisms.
PSA Stealer is apparently being distributed through phishing emails and malicious landing pages
The malicious attachments contain a legitimate program (such as a PDF reader) and a weaponized DLL.
The program sideloads the DLL, successfully deploying the malware while not raising any alarms.
Hackers who are from Vietnamize origin are selling data selling it on the black market – in a Telegram group. The majority of the victims are located in South Korea, the US, the Netherlands, Hungary, and Austria.
So far, more than 200,000 were stolen passwords, as well as hundreds of credit card information and more than four million cookies.
Vulnerability in SAP NetWeaver recently discovered by threat researchers from from Palo Alto Networks’ Unit 42 is being exploited to deploy Linux malware is capable of running arbitrary system commands and deploying additional payloads, experts have warned.
Security researchers from Palo Alto Networks’ Unit 42 discovered a piece of malware called Auto-Color, a backdoor, from Linux and dubbed for its ability to rename itself after installation.
The researchers found it was capable of opening reverse shells, executing arbitrary system commands, acting as a proxy, uploading and modifying files.
This also include adjusting settings dynamically. It was also discovered that the backdoor remains mostly dormant if its C2 server is unreachable, effectively evading detection by staying inactive until the operator instructions arrive.
Mitigating threat from Malware
Malware is any software intentionally designed to damage, disrupt, or gain unauthorized access to computer systems. In cybersecurity the diversity of malware include viruses, worms, spyware and ransomware. Each has unique attack methods, so it’s essential to understand their nature and behavior to mitigate potential risks.
How does Malware spread & threat Malware pose?
All channels available at disposal should be monitored when we think of malware and how they spread. All types of malware can spread in various ways, using technical vulnerabilities and human inattention to infiltrate systems and networks, but some methods prove more successful than others. Understanding how malware typically presents itself and spreads can help businesses stay vigilant against its damage.
Deceive & Defend against Malware with Mirage Cloak from IntruceptLabs
Mirage Cloak offers various deception methods to detect and stop threats before they cause damage. These methods include adding decoys to the network, deploying breadcrumbs on current enterprise assets, using baits as tripwires on endpoints, and setting up lures with intentionally misconfigured or vulnerable services or applications. The flexible framework also lets customers add new deception methods as needed.
- Our AI-powered proactive defense system identifies potential threats in real time, giving you the upper hand in protecting your network and assets.
- By leveraging advanced artificial intelligence, our system reduces false positives, allowing your security team to focus on genuine threats and respond effectively.
- With machine learning capabilities, our defense system continuously learns and evolves, adapting to new attack vectors and staying ahead of cyber threats.
Do connect with us for any query: https://intruceptlabs.com/contact/
(Source: Dangerous new Linux malware strikes – thousands of users see passwords, personal info stolen, here’s what we know | TechRadar)