• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Mélofée: Researchers Uncover New Linux Malware Linked to Chinese APT Groups

You are here: Home / Cyber Security News / Mélofée: Researchers Uncover New Linux Malware Linked to Chinese APT Groups

An not known Chinese state-sponsored hacking group has been connected to a novel piece of malware aimed at Linux servers.

French cybersecurity organization ExaTrack, which discovered a few samples of the formerly documented malicious application that day again to early 2022, dubbed it Mélofée.

One of the artifacts is built to fall a kernel-manner rootkit that is centered on an open up resource job referred to as Reptile.

“According to the vermagic metadata, it is compiled for a kernel edition 5.10.112-108.499.amzn2.x86_64,” the business explained in a report. “The rootkit has a confined set of options, mostly installing a hook developed for hiding itself.”

Both equally the implant and the rootkit are claimed to be deployed utilizing shell commands that obtain an installer and a custom made binary offer from a remote server.

The installer usually takes the binary offer as an argument and then extracts the rootkit as perfectly as a server implant module which is presently below active progress.

Mélofée’s functions are no various from other backdoors of its type, enabling it to speak to a distant server and obtain recommendations that make it possible for it to carry out file functions, generate sockets, start a shell, and execute arbitrary instructions.

The malware’s ties to China come from infrastructure overlaps with groups this kind of as APT41 (aka Winnti) and Earth Berberoka (aka GamblingPuppet).

Earth Berberoka is the title specified to a condition-sponsored actor mainly targeting gambling sites in China considering the fact that at the very least 2020 applying multi-platform malware like HelloBot and Pupy RAT.

In accordance to Trend Micro, some samples of the Python-dependent Pupy RAT have been concealed utilizing the Reptile rootkit.

WEBINARDiscover the Hidden Potential risks of 3rd-Occasion SaaS Applications

Are you knowledgeable of the dangers affiliated with third-party application obtain to your company’s SaaS apps? Join our webinar to find out about the varieties of permissions currently being granted and how to minimize risk.

RESERVE YOUR SEAT

Also identified by ExaTrack is another implant codenamed AlienReverse, which shares code similarities with Mélofée and would make use of publicly-available tools like EarthWorm and socks_proxy.

“The Mélofée implant family is an additional device in the arsenal of Chinese point out sponsored attackers, which show consistent innovation and growth,” the corporation said.

“The abilities available by Mélofée are relatively easy, but may allow adversaries to conduct their attacks underneath the radar. These implants were being not broadly noticed, demonstrating that the attackers are probably restricting its usage to high price targets.”

Located this write-up fascinating? Comply with us on Twitter  and LinkedIn to read much more special articles we write-up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Smart Mobility has a Blindspot When it Comes to API Security
Next Post: Experts Warn of Self-Funding North Korean Group APT43 »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.