Researchers have uncovered a never-before-seen backdoor written from scratch for techniques operating Home windows, macOS, or Linux that remained undetected by just about all malware scanning engines.
Researchers from safety agency Intezer mentioned they found SysJoker—the identify they gave the backdoor—on the Linux-based Webserver of a “main instructional establishment.” Because the researchers dug in, they discovered SysJoker variations for each Home windows and macOS as properly. They think the cross-platform malware was unleashed within the second half of final 12 months.
The invention is important for a number of causes. First, totally cross-platform malware is one thing of a rarity, with most malicious software program being written for a selected working system. The backdoor was additionally written from scratch and made use of 4 separate command-and-control servers, a sign that the individuals who developed and used it had been a part of a complicated menace actor that invested important sources. It’s additionally uncommon for beforehand unseen Linux malware to be present in a real-world assault.
Wardle, in the meantime, mentioned the .ts extension could point out the file masqueraded as video transport stream content material. He additionally discovered that the macOS file was digitally signed, although with an ad-hoc signature.
SysJoker is written in C++, and as of Tuesday, the Linux and macOS variations had been totally undetected on the VirusTotal malware search engine. The backdoor generates its control-server area by decoding a string retrieved from a textual content file hosted on Google Drive. In the course of the time the researchers had been analyzing it, the server modified thrice, indicating the attacker was energetic and monitoring for contaminated machines.
Based mostly on organizations focused and the malware’s conduct, Intezer’s evaluation is that SysJoker is after particular targets, more than likely with the objective of “espionage along with lateral motion which could additionally result in a ransomware assault as one of many subsequent phases.”