ESET Found New  Backdoor in Linux Which Can Give  Full Control Over Vulnerable Devices
Homehackingsecurity

ESET Found New Backdoor in Linux Which Can Give Full Control Over Vulnerable Devices

SHARE:

Security company ESET detects new wave of linux attack
Security company ESET discovered a new form of malware that’s specifically targeting embedded Linux devices with the purpose of infecting them and providing hackers with full control, while also leaving the door open for a series of other dangerous tasks, including launching DDoS attacks.

Called Rakos, the new malware launches attacks at embedded devices and servers with an open SSH port and uses brute force attempts to crack the password.

ESET claims that Rakos creators want to infect as many systems as possible to create a botnet that could be then used for other malicious attacks, such as DDoS attacks and spam spreading.

At first, attackers scan for vulnerable systems by analyzing pre-defined IP ranges, but given the fact that brute force attacks are being used to break in, only machines with very weak passwords are compromised.

Once access is obtained and the malware reaches the Linux device, Rakos starts a local HTTP service available at http://127.0.0.1:61314 with two different purposes.

“The first is as a cunning method for the future versions of the bot to kill the running instances regardless of their name by requesting http://127.0.0.1:1314/et; second, it tries to parse a URL query for parameters “ip”, “u”, “p” by requesting http://127.0.0.1:61314/ex. The purpose of this /ex HTTP resource is still unclear at the time of writing and it seems not to be referenced elsewhere in the code,” ESET says.
The malware automatically scans for and collects information that is then submitted to a C&C server, including here IP address, usernames and passwords. A configuration file that’s stored locally makes it possible for the backdoor to upgrade this file with new tasks, but also to upgrade its own files should the attacker develop a more advanced version in the future.

How to remove a Rakos infection

It’s important to emphasize that complex SSH passwords are nearly impossible to crack by this malware and attackers are mostly looking for Linux devices using weak passwords.

But if for some reason your embedded device got infected, you need to connect to it using SSH/Telnet and look for a process called .javaxxx. Make sure that it’s being used for unwanted connections and then kill the process.

Rebooting the computer also kills the process and the backdoor isn’t yet configured to automatically restart, but in most of the cases, the device will be compromised again after that.

Secure SSH credentials are absolutely mandatory to remain protected against Rakos, and ESET says that the number of attacks involving this backdoor is on the rise these days.
Name

2016,2,2017,1,360degree,1,360video,1,4k,1,5g,1,8K,1,A series,1,account,2,adobe,1,ads,2,aerial,1,altaba,1,ambassador,1,andriod,30,android,2,antivirus,3,Apple,53,apple watch,1,Apps,34,appstore,1,arrest,1,assassin creed 3,1,atm,1,attack,3,audio,1,backdoor,1,backup,1,ban,3,bank,4,battery,4,best of 2016,2,beta,1,bitcoins,1,bittorrent,8,block,1,bluetooth,1,britney spear,1,browser,8,business,2,bypass,1,callofduty,1,camera,1,cars,1,cash,1,cellebrite,1,CES2017,3,charge,1,china,2,chrome,2,CIA,1,cocacola,1,commandprompt,1,complaint,1,connection,2,copyright,2,cortana,1,crash,1,crime,3,cyanogen,1,cyberlocker,1,D-link,1,darkweb,1,dash charge,1,database,1,databeach,5,ddos,6,deadpool,1,death,1,dell,2,denuvo,1,design,1,desktop,1,dji,1,dmca,2,dns hijacking,1,domain,1,doom,1,download,1,downloader,2,drone,3,durable,1,dvdvideosoft,1,edge,1,eset,1,ex.ua,1,expert,1,explode,3,exploit,1,extratorrent,2,facebook,11,fake,3,fbi,1,FDA,1,findmyiphone,1,fireEye,1,firefox,2,FTC,1,g6,1,gadget,11,galaxy A5,1,galaxy A7,1,galaxy C5,1,game,19,game of throne,1,gaming,2,Gear s2,1,Gear s3,1,giveaway,1,google,28,google playstore,1,hacker,5,hacking,75,hangouts,1,history,1,htc,1,htc 10,1,huawei,3,hyperloop,1,illegal,3,imax,1,imessage,1,improvement,1,india,3,information,1,inspire2,1,instagram,3,intel,1,internet,19,ios,28,ios 10.2,1,iphone,33,iphone 7s,1,iphone6,4,iphone6plus,3,iphone6s,4,iphone7,2,iphone7plus,3,japan,1,kapustkiy,1,kaspersky,3,keyboard for andriod,1,kickass,1,killer,1,laptop,1,latest,13,leak,11,lg,2,limes audio,1,linkedln,2,linux,3,live video,1,lottery,1,lynda,1,mac,1,macbook,5,malware,10,medical report,1,microsoft,43,money,1,monitor,1,movie,1,Music,5,nasa,2,navy,1,netflix,4,network,1,news,2,nintendo,2,noaa,1,nokia,4,nokia 6,1,north korea,1,note5,1,note7,5,nougat,7,nsa,1,office,1,oneplus,4,oneplus 3,1,oneplus 3T,1,oneplus4,1,online,1,os,5,ourmine,2,pacemaker,1,password,2,patch,1,pc,2,periscope,1,photography,2,picture,1,piracy,7,pirate,6,pirate bay,6,pixel,6,pixel xl,1,pizza,1,playstation,4,playstore,3,pokemon go,1,police,1,powershell,1,prisma,1,prison,1,privacy,2,project Valerie,1,Projector,1,protection,1,prototype,1,putlocker,1,qualcomm,1,ransomware,2,raspberrypi,1,rating,1,razer,1,recall,6,red star,1,redstone,1,refund,1,remove,1,rename,1,review,2,rumors,4,russia,7,s6,1,s6edge,1,s7,1,s7edge,2,samsung,27,satelite,1,searchengine,1,security,34,selfie,1,server,1,shadow broker,1,shutdown,8,siri,1,skippable,1,skype,1,smartphone,101,socialnetwork,11,software,1,sony,5,space,2,sqlinjection,1,stolen,1,supercomputer,1,supermario run,2,support,1,system,2,tabs2,1,tango,1,target,1,tech,53,Technology Explained,4,tesla,1,the mummy,1,tools,1,torrent,10,torrent site,1,track,1,trademark,1,TV show,1,twitter,5,ubisoft,2,uk,4,unlock,1,upcoming,1,update,22,us,5,usbkiller,1,users,1,USTR,2,vespa,1,video,4,videoplayer,1,vines,1,visualstudio,1,vlc,1,VR,3,vulnerability,15,vulnrrability,1,warning,1,watchdog2,1,website,2,what.cd,2,whatsapp,1,wifi,3,wikileaks,1,windows,33,windows10,5,wireshark,1,xbox,4,xiaomi,1,xperia,2,yahoo,1,youtube,5,youtubekids,1,
ltr
item
MOUNT TECH: ESET Found New Backdoor in Linux Which Can Give Full Control Over Vulnerable Devices
ESET Found New Backdoor in Linux Which Can Give Full Control Over Vulnerable Devices
backdoor in linux
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkfCl09KkojtAYRFijZcPPylzExJYqCNQoemkStxjlyGcMQW8km0FkffoQpBTHL1ZhxjuZO1uGNqLvIaEmmGPvGkusCxCPOrEkNy3SuCbgi-a5d39-kLCUwYMT9ejrfcQj3YrY9hfhxbV5/s1600/eset-found-new-backdoor-in-linux-which-can-give-full-control-over-vulnerable-devices.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkfCl09KkojtAYRFijZcPPylzExJYqCNQoemkStxjlyGcMQW8km0FkffoQpBTHL1ZhxjuZO1uGNqLvIaEmmGPvGkusCxCPOrEkNy3SuCbgi-a5d39-kLCUwYMT9ejrfcQj3YrY9hfhxbV5/s72-c/eset-found-new-backdoor-in-linux-which-can-give-full-control-over-vulnerable-devices.jpg
MOUNT TECH
http://mount-tech.blogspot.com/2016/12/eset-found-new-backdoor-in-linux-which-can-give-full-control-over-vulnerable-devices.html
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/2016/12/eset-found-new-backdoor-in-linux-which-can-give-full-control-over-vulnerable-devices.html
true
5023700227490855537
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy