New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

Feb 26, 2025Ravie LakshmananLinux / Endpoint Safety

Universities and authorities organizations in North America and Asia have been focused by a beforehand undocumented Linux malware referred to as Auto-Shade between November and December 2024, in response to new findings from Palo Alto Networks Unit 42.

“As soon as put in, Auto-color permits menace actors full distant entry to compromised machines, making it very tough to take away with out specialised software program,” safety researcher Alex Armstrong said in a technical write-up of the malware.

Cybersecurity

Auto-color is so named based mostly on the file identify the preliminary payload renames itself put up set up. It is presently not identified the way it reaches its targets, however what’s identified is that it requires the sufferer to explicitly run it on their Linux machine.

A notable side of the malware is the arsenal of methods it employs to evade detection. This contains utilizing seemingly-innocuous file names like door or egg, concealing command-and-control (C2) connections, and leveraging proprietary encryption algorithms for masking communication and configuration info.

As soon as launched with root privileges, it proceeds to put in a malicious library implant named “libcext.so.2,” copies and renames itself to /var/log/cross/auto-color, and makes modifications to “/and so forth/ld.preload” for establishing persistence on the host.

“If the present consumer lacks root privileges, the malware won’t proceed with the set up of the evasive library implant on the system,” Armstrong mentioned. “It would proceed to do as a lot as potential in its later phases with out this library.”

The library implant is provided to passively hook capabilities utilized in libc to intercept the open() system call, which it makes use of to cover C2 communications by modifying “/proc/internet/tcp,” a file that accommodates info on all lively community connections. The same method was adopted by one other Linux malware referred to as Symbiote.

Cybersecurity

It additionally prevents uninstallation of the malware by defending the “/and so forth/ld.preload” towards additional modification or elimination.

Auto-color then proceeds to contact a C2 server, granting the operator the power to spawn a reverse shell, collect system info, create or modify recordsdata, run packages, use the machine as a proxy for communication between a distant IP deal with and a selected goal IP deal with, and even uninstall itself by the use of a kill change.

“Upon execution, the malware makes an attempt to obtain distant directions from a command server that may create reverse shell backdoors on the sufferer’s system,” Armstrong mentioned. “The menace actors individually compile and encrypt every command server IP utilizing a proprietary algorithm.”

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.

Leave a Reply