SpeakUp, new Trojan affecting Linux and macOS

by | Feb 7, 2019

ETIQUETAS: Hot news | Linux-en | Security

Security experts at Check Point have discovered a new Trojan that exploits vulnerabilities in six Linux distributions and macOS devices. This malware is able to implement a backdoor in the system that dodges the antivirus and other security solutions installed on the devices.

The attack targets servers in East Asia and Latin America, and is also affecting machines hosted on Amazon Web Services (AWS). There are more than 70,000 affected servers so far.

The modus operandi of SpeakUp is brute-force access, network environment analysis and the use of remote code execution vulnerabilities. The tasks that come to SpeakUp from the command and control center with which it connects point above all to the download and execution of files. It also, uses XMRig miners.

Given the complexity of the malware, Check Point warns that SpeakUp could become a more dangerous threat, as it could allow the deployment of “additional payloads that are potentially more intrusive and offensive”.

Source: Silicon

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content