{"id":19349,"date":"2022-06-15T08:10:41","date_gmt":"2022-06-15T16:10:41","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/15\/news-13082\/"},"modified":"2022-06-15T08:10:41","modified_gmt":"2022-06-15T16:10:41","slug":"news-13082","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/15\/news-13082\/","title":{"rendered":"Stealthy Symbiote Linux malware is after financial institutions"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Wed, 15 Jun 2022 15:48:24 +0000<\/strong><\/p>\n<p>Symbiote, a new &#8220;nearly impossible to detect&#8221; Linux malware, targeted financial sectors in Latin America\u2014and the threat actors behind it might have links to Brazil. These findings were revealed in <a href=\"https:\/\/blogs.blackberry.com\/en\/2022\/06\/symbiote-a-new-nearly-impossible-to-detect-linux-threat\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">a recent report<\/a>, a joint effort between the Blackberry Research Team and Dr. Joakim Kennedy, a security researcher with Intezer.<\/p>\n<p>Despite its name, this Trojan\u2014first seen in November 2021\u2014is more parasitic than a mutual benefactor in a symbiosis, according to Dr. Kennedy. And this is what sets Symbiote apart from other Linux malware.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;[I]t needs to infect other running processes to inflict damage on infected machines. Instead of being a standalone executable file that is run to infect a machine, it is a shared object (SO) library that is loaded into all running processes using\u00a0LD_PRELOAD<strong>\u00a0<\/strong>(T1574.006),\u00a0and parasitically infects the machine.<\/p>\n<p>Once it has infected all the running processes, it provides the threat actor with rootkit functionality, the ability to harvest credentials, and remote access capability.&#8221;<\/p>\n<\/blockquote>\n<p>This abuse of the environmental variable LD_PRELOAD appears to be the &#8220;LD_PRELOAD trick&#8221; described <a href=\"http:\/\/www.goldsborough.me\/c\/low-level\/kernel\/2016\/08\/29\/16-48-53-the_-ld_preload-_trick\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">in this post<\/a>. Since Symbiote is a shared object, the threat actor can set LD_PRELOAD to its path. In effect, this malformed file is loaded first <em>before<\/em> other shared objects. And because it&#8217;s loaded first, Symbiote can &#8220;hijack the imports&#8221; from other SO files.<\/p>\n<p>This enables it to hide on infected Linux machines.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"57493\" data-permalink=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/stealthy-symbiote-linux-malware-is-after-financial-institutions\/attachment\/blackberry-intezer-symbiote-eva\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/blackberry-intezer-symbiote-eva.png\" data-orig-size=\"1200,653\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"blackberry-intezer-symbiote-eva\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/blackberry-intezer-symbiote-eva-300x163.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/blackberry-intezer-symbiote-eva-600x327.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/blackberry-intezer-symbiote-eva.png\" alt=\"\" class=\"wp-image-57493\" width=\"900\" height=\"490\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/blackberry-intezer-symbiote-eva.png 1200w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/blackberry-intezer-symbiote-eva-300x163.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/blackberry-intezer-symbiote-eva-600x327.png 600w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><figcaption>Symbiote&#8217;s evasion techniques (Source: <a href=\"https:\/\/blogs.blackberry.com\/en\/2022\/06\/symbiote-a-new-nearly-impossible-to-detect-linux-threat\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Blackberry Threat Vector Blog<\/a>)<\/figcaption><\/figure>\n<\/div>\n<h2>Symbiote: the hows and whys of its ways<\/h2>\n<p>Once all processes have been infected, the Linux machine is as good as being infected. Symbiote then triggers its rootkit capabilities to hide, including other malware the threat actor may have dropped onto the device, processes, and network artifacts. This makes detection and active forensic examinations difficult.<\/p>\n<p>Symbiote also offers threat actors a backdoor to the infected Linux machine, to which they can log in as a user with the highest privilege using a hardcoded password.<\/p>\n<p>Per Dr. Kennedy, one exciting aspect Symbiote has is its Berkeley Packet Filter (BPF) hooking functionality. It does this to hide malicious traffic on an infected Linux machine. If you&#8217;re a threat actor, this is an excellent method when you don&#8217;t want to alert system admins of any network shenanigans on an infected Linux machine, as Symbiote can filter out such suspicious network traffic.<\/p>\n<p>As a credential stealer, being stealthy is not an option.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;The malware&#8217;s objective, in addition to hiding malicious activity on the machine, is to harvest credentials and provide remote access for the threat actor. The credentials are first encrypted with RC4 using an embedded key, and then written to a file.<\/p>\n<p>In addition to storing the credentials locally, the credentials are exfiltrated. The data is hex encoded and chunked up to be exfiltrated via DNS address record requests to a domain name controlled by the threat actor.&#8221;<\/p>\n<\/blockquote>\n<p>The researchers further report that Symbiote impersonated Brazilian bank websites, suggesting Brazilians are the target of this campaign. The IP address of these domains is linked to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Njalla\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Njalla<\/a> Virtual Private Server (VPS) service. Furthermore, &#8220;Passive DNS records showed that the same IP address was resolved to&nbsp;ns1[.]cintepol[.]link<strong>&nbsp;<\/strong>and&nbsp;ns2[.]cintepol[.]link<strong>&nbsp;<\/strong>a few months earlier.&#8221;<\/p>\n<p>Cintepol is said to be the intelligence portal of the Federal Police of Brazil, which allowed its police officers to access intelligence from the federal police when investigating. This fake Cintepol site was abandoned in January 2022 in favor of another domain pointing to another Njalla VPS IP.<\/p>\n<h2>Protect against Symbiote<\/h2>\n<p>The threat actors behind Symbiote put a lot of effort into making it as under-the-radar as possible. However, Vulcan Cyber&#8217;s Mike Parkin, senior technical engineer, said in <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/symbiote-malware-stealthy-linux-based-threat-financial-industry\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">an interview with Dark Reading<\/a> that the evasion tactics in Symbiote can still be detected by other network monitoring tools that can pinpoint malicious traffic and the infected Linux system. <\/p>\n<p>Parkin further added that several endpoint tools should be able to identify malicious changes on infected systems.<\/p>\n<p>&#8220;There are also forensic techniques that can use the malware&#8217;s own behavior against it to reveal its presence,&#8221; Parkin noted. &#8220;They leveraged a combination of techniques, though in so doing delivered some indicators of compromise that defenders could use to identify an infection in-situ.&#8221;<\/p>\n<p>The Blackberry and Intezer report contains <a href=\"https:\/\/blogs.blackberry.com\/en\/2022\/06\/symbiote-a-new-nearly-impossible-to-detect-linux-threat\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">many indicators of compromise (IOCs)<\/a> that IT admins should use to beef up the security of their Linux boxes.<\/p>\n<p>You can also read our article on Malwarebytes&#8217; <a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2022\/06\/introducing-edr-for-linux-remediating-and-isolating-threats-on-linux-servers\/\">EDR for Linux<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/stealthy-symbiote-linux-malware-is-after-financial-institutions\/\">Stealthy Symbiote Linux malware is after financial institutions<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/stealthy-symbiote-linux-malware-is-after-financial-institutions\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Wed, 15 Jun 2022 15:48:24 +0000<\/strong><\/p>\n<p>Symbiote, the latest malware to hit Linux users, is a parasite more than anything. Protect against this banking credential stealer now!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/reports\/2022\/06\/stealthy-symbiote-linux-malware-is-after-financial-institutions\/\">Stealthy Symbiote Linux malware is after financial institutions<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26571,6031,26572,26573,26574,26575,26576,26577,26578,26579,10496,26580,26581,21882,26582,26583,26584,26278,1804,26585,26586],"class_list":["post-19349","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-berkeley-packet-filter","tag-blackberry","tag-blackberry-research-team","tag-bpf","tag-cintepol","tag-dr-joakim-kennedy","tag-federal-police-of-brazil","tag-intezer","tag-ld_preload","tag-ld_preload-trick","tag-linux","tag-linux-banking-trojan","tag-linux-credential-stealer","tag-linux-malware","tag-linux-rootkit","tag-linux-symbiote","tag-linux-symbiote-malware","tag-linux-trojan","tag-reports","tag-stealthy-linux-malware","tag-symbiote-malware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19349"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19349\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19349"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}