The Linux operating system remains aloof from most malware attacks, as most attackers often target Windows systems. However, there are threats discovered from time to time that affect Linux devices as well.
Threat researchers at Anomali Labs have discovered a new malware, dubbed “Linux Rabbit” which targets Linux servers and IoT devices. The attack campaign began in August 2018 and lasted till October 2018, targeting devices in Russia, South Korea, the UK, and the US, according to the researchers.
The malware, in this case, aimed to install different Monero mining malware variants, depending on the targeted device’s architecture. Two strains of malware, named Linux Rabbit and “Rabbot”, were used in this campaign which had the same code base. Only devices in specific countries were targeted in this campaign.
The researchers at Anomali Labs listed four key functionalities of this malware:
The researchers discovered that the attackers began the first Linux Rabbit campaign in August 2018, using a different strain of malware from the one that was used in the campaign that lasted between September 2018 to October 2018. The attackers built a self-propagating worm, dubbed Rabbot from the same code base as Linux Rabbit, which was then used for the second campaign.
There are several key differences between Linux Rabbit and Rabbot:
The researchers provided a list of the known vulnerabilities exploited by Rabbot malware which could be helpful for developers to write patches, so as to defend against this malware strain. With the increasing number of malware discoveries for the Linux operating system in recent times, it calls for more attention from the threat research community in order to keep the reliability of Linux systems intact.
Publisher