ESET researchers examined the inner workings of 21 different Linux malware families all operating as trojanized versions of the OpenSHH client.
Researchers noted 12 of the malwares were previously undocumented, 18 had credential-stealing features and 17 featured a backdoor mode, according to the company’s “The Dark Side Of The FORSSHE: A landscape of OpenSSH backdoors” report.
In addition, researchers discovered that an SSH backdoor used by DarkLeech operators is the same as that used by Carbanak a few years later and that threat actors had developed a wide spectrum of complexity in backdoor implementations, starting from off-the-shelf malware to obfuscated samples and network protocols.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.