Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Microsoft’s new Copilot Tasks finally does the work for you

Microsoft’s new Copilot Tasks finally does the work for you

28 February 2026
Apple’s hotly-awaited low-cost MacBook might not be so low-cost, after all

Apple’s hotly-awaited low-cost MacBook might not be so low-cost, after all

28 February 2026
This app turns your smartphone into a fetal heart rate monitor

This app turns your smartphone into a fetal heart rate monitor

28 February 2026
Facebook X (Twitter) Instagram
Just In
  • Microsoft’s new Copilot Tasks finally does the work for you
  • Apple’s hotly-awaited low-cost MacBook might not be so low-cost, after all
  • This app turns your smartphone into a fetal heart rate monitor
  • Anthropic Hits Back After US Military Labels It a ‘Supply Chain Risk’
  • HBO Max is cracking down on password sharing, and price hikes might be part of the plan
  • I’m thrilled by Wednesday’s star-studded third year, here’s everything we know about season 3
  • A premium 4K projector under $1,000 is the kind of deal home theater fans wait for
  • Everything Larry and David Ellison Will Control If Paramount Buys Warner Bros.
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Stealthy Malware Has Infected Thousands of Linux Systems for Years
News

Stealthy Malware Has Infected Thousands of Linux Systems for Years

News RoomBy News Room5 October 20243 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Stealthy Malware Has Infected Thousands of Linux Systems for Years
Share
Facebook Twitter LinkedIn Pinterest Email

Other discussions include: Reddit, Stack Overflow (Spanish), forobeta (Spanish), brainycp (Russian), natnetwork (Indonesian), Proxmox (Deutsch), Camel2243 (Chinese), svrforum (Korean), exabytes, virtualmin, serverfault and many others.

After exploiting a vulnerability or misconfiguration, the exploit code downloads the main payload from a server, which, in most cases, has been hacked by the attacker and converted into a channel for distributing the malware anonymously. An attack that targeted the researchers’ honeypot named the payload httpd. Once executed, the file copies itself from memory to a new location in the /temp directory, runs it, and then terminates the original process and deletes the downloaded binary.

Once moved to the /tmp directory, the file executes under a different name, which mimics the name of a known Linux process. The file hosted on the honeypot was named sh. From there, the file establishes a local command-and-control process and attempts to gain root system rights by exploiting CVE-2021-4043, a privilege-escalation vulnerability that was patched in 2021 in Gpac, a widely used open source multimedia framework.

The malware goes on to copy itself from memory to a handful of other disk locations, once again using names that appear as routine system files. The malware then drops a rootkit, a host of popular Linux utilities that have been modified to serve as rootkits, and the miner. In some cases, the malware also installs software for “proxy-jacking,” the term for surreptitiously routing traffic through the infected machine so the true origin of the data isn’t revealed.

The researchers continued:

As part of its command-and-control operation, the malware opens a Unix socket, creates two directories under the /tmp directory, and stores data there that influences its operation. This data includes host events, locations of the copies of itself, process names, communication logs, tokens, and additional log information. Additionally, the malware uses environment variables to store data that further affects its execution and behavior.

All the binaries are packed, stripped, and encrypted, indicating significant efforts to bypass defense mechanisms and hinder reverse engineering attempts. The malware also uses advanced evasion techniques, such as suspending its activity when it detects a new user in the btmp or utmp files and terminating any competing malware to maintain control over the infected system.

By extrapolating data such as the number of Linux servers connected to the internet across various services and applications, as tracked by services such as Shodan and Censys, the researchers estimate that the number of machines infected by Perfctl is measured in the thousands. They say that the pool of vulnerable machines—meaning those that have yet to install the patch for CVE-2023-33426 or contain a vulnerable misconfiguration—is in the millions. The researchers have yet to measure the amount of cryptocurrency the malicious miners have generated.

People who want to determine if their device has been targeted or infected by Perfctl should look for indicators of compromise included in Thursday’s post. They should also be on the lookout for unusual spikes in CPU usage or sudden system slowdowns, particularly if they occur during idle times. Thursday’s report also provides steps for preventing infections in the first place.

This story originally appeared on Ars Technica.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleXiaomi 15 Pro Specifications Leaked Alongside Images Hinting at Three Colourways
Next Article The most underrated horror sequel of this century is finally streaming again on Max

Related Articles

Microsoft’s new Copilot Tasks finally does the work for you
News

Microsoft’s new Copilot Tasks finally does the work for you

28 February 2026
Apple’s hotly-awaited low-cost MacBook might not be so low-cost, after all
News

Apple’s hotly-awaited low-cost MacBook might not be so low-cost, after all

28 February 2026
This app turns your smartphone into a fetal heart rate monitor
News

This app turns your smartphone into a fetal heart rate monitor

28 February 2026
Anthropic Hits Back After US Military Labels It a ‘Supply Chain Risk’
News

Anthropic Hits Back After US Military Labels It a ‘Supply Chain Risk’

28 February 2026
HBO Max is cracking down on password sharing, and price hikes might be part of the plan
News

HBO Max is cracking down on password sharing, and price hikes might be part of the plan

28 February 2026
I’m thrilled by Wednesday’s star-studded third year, here’s everything we know about season 3
News

I’m thrilled by Wednesday’s star-studded third year, here’s everything we know about season 3

28 February 2026
Demo
Top Articles
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024111 Views
Costco partners with Electric Era to bring back EV charging in the U.S.

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202499 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
I’m thrilled by Wednesday’s star-studded third year, here’s everything we know about season 3 News

I’m thrilled by Wednesday’s star-studded third year, here’s everything we know about season 3

News Room28 February 2026
A premium 4K projector under ,000 is the kind of deal home theater fans wait for News

A premium 4K projector under $1,000 is the kind of deal home theater fans wait for

News Room28 February 2026
Everything Larry and David Ellison Will Control If Paramount Buys Warner Bros. News

Everything Larry and David Ellison Will Control If Paramount Buys Warner Bros.

News Room28 February 2026
Most Popular
The Spectacular Burnout of a Solar Panel Salesman

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025137 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024126 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024111 Views
Our Picks
Anthropic Hits Back After US Military Labels It a ‘Supply Chain Risk’

Anthropic Hits Back After US Military Labels It a ‘Supply Chain Risk’

28 February 2026
HBO Max is cracking down on password sharing, and price hikes might be part of the plan

HBO Max is cracking down on password sharing, and price hikes might be part of the plan

28 February 2026
I’m thrilled by Wednesday’s star-studded third year, here’s everything we know about season 3

I’m thrilled by Wednesday’s star-studded third year, here’s everything we know about season 3

28 February 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.