Beware - a brand new malware family is infecting Linux systems

Trojan
(Image credit: wk1003mike / Shutterstock)

There’s a new malware family in town - and one that attacks Linux systems by concealing itself in legitimate binaries to deliver several backdoor and rootkits.

Dubbed FontOnLake, by cybersecurity researchers at ESET, samples of the malware date as far back as May 2020.

According to the researchers, the malware makes use of several carefully crafted modules that not just collect credentials, but also give remote access to the threat actors.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“The sneaky nature of FontOnLake’s tools in combination with advanced design and low prevalence suggest that they are used in targeted attacks,” believes Vladislav Hrčka, malware analyst and reverse engineer at ESET.

Trojanized utilities

Hrčka notes that all the malware disguises itself inside trojanized versions of standard Linux utilities, including cat, kill, and sshd. In fact, one of the samples the researchers analyzed was created specifically for CentOS and Debian.

However, the exact mechanism employed by the threat actors to replace the original utilities with the malicious ones remains a mystery.

Analyzing the malware, the researchers note that the samples contained three custom backdoors written in C++, which gave remote access to the infected machines to the operators of the malware.

The location of the Command and Control (C2) server and the countries from which the samples were uploaded indicate that the attackers were after targets based in Southeast Asia.

“Following our discovery while finalizing our white paper on this topic, vendors such as Tencent Security Response Center, Avast and Lacework Labs published their research on what appears to be the same malware,” notes Hrčka, adding that ESET’s products can flag all the components of the malware. 

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
Close up of the Linux penguin.
A new Linux backdoor is hitting US universities and governments
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Huge cybercrime attack sees 390,000 WordPress websites hit, details stolen
A white padlock on a dark digital background.
Developers targeted by malicious Microsoft VSCode extensions
China
Chinese hackers develop effective new hacking technique to go after business networks
A digital representation of a lock
Security experts are being targeted with fake malware discoveries
Mustang Panda
Chinese hackers abuse Microsoft tool to get past antivirus and cause havoc
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
The FCC is creating a security council to bolster US defenses against cyberattacks
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Ransomware
Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Meta warns of worrying security flaw hitting open source type software
Hand holding smartphone and scan fingerprint biometric identity for unlock her mobile phone
Biometrics add another layer of security to passwordless authentication
Data leak
Hacked Tata Technologies data leaked by ransomware gang
Latest in News
Google Gemini Flash 2.0 Images
I tried Gemini's new AI image generation tool - here are 5 ways to get the best art from Google's Flash 2.0
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung Galaxy S26 Ultra could resurrect an intriguing camera feature
Eurocom Raptor X18
At $15,000, this massive 256GB RAM laptop makes Apple's MacBook Pro look affordable, tiny and very, very slow
Cristin Milioti in Black Mirror season 7
Netflix launches trailer for Black Mirror season 7, giving us a look at its first-ever sequel episode and an unexpected returning character
A graphic of the PC Gaming Show
Get ready for a bounty of PC games on June 8, as the PC Gaming show is back
A close up of The Daily podcast from Pocket Casts&#039; web page
‘Podcasting shouldn’t be locked behind walled gardens’: Pocket Casts slams Spotify and makes its web player free to all