RotaJakiro: A recently discovered trojan threatens Linux users

by | May 4, 2021

A new malware targeting Linux operating systems takes control of the computers it manages to infect through a backdoor. Security firm 360 Netlab has identified this Trojan, known as RotaJariko .

This malicious software has been stalking users for at least three years without being detected since it works in a very discreet way. First, it finds out if the user is root to determine the best way to approach the system and hide itself. It analyzes the sensitive resources of the device and creates a back door, establishing communication with the command and control server .

It is striking how effective its methods are to hide the processes it runs. It uses different encryption algorithms, such as AES, XOR, and ROTATE combined with ZLIB compression. To cover up the reception of control commands, RotaJarico accessed four domains through port 443 and using its own protocol .

The exact purpose of this malicious software is not entirely clear. It is capable of executing up to twelve different functions, so the researchers consider several hypotheses. It could be used to steal sensitive data, information from the infected terminal, take control and manage files or run specific plugins.

For more information about this malware, you can consult this article by 360 Netlab.

SHARE

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.

Archives


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content