Article Details

Scrape Timestamp (UTC): 2024-03-28 17:07:19.027

Source: https://thehackernews.com/2024/03/linux-version-of-dinodasrat-spotted-in.html

Original Article Text

Click to Toggle View

Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries. A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targeting China, Taiwan, Turkey, and Uzbekistan, new findings from Kaspersky reveal. DinodasRAT, also known as XDealer, is a C++-based malware that offers the ability to harvest a wide range of sensitive data from compromised hosts. In October 2023, Slovak cybersecurity firm ESET revealed that a governmental entity in Guyana has been targeted as part of a cyber espionage campaign dubbed Operation Jacana to deploy the Windows version of the implant. Then last week, Trend Micro detailed a threat activity cluster it tracks as Earth Krahang and which has shifted to using DinodasRAT since 2023 in its attacks aimed at several government entities worldwide. The use of DinodasRAT has been attributed to various China-nexus threat actors, including LuoYu, once again reflecting the tool sharing prevalent among hacking crews identified as acting on behalf of the country. Kaspersky said it discovered a Linux version of the malware (V10) in early October 2023. Evidence gathered so far shows that the first known variant (V7) dates back to 2021. It's mainly designed to target Red Hat-based distributions and Ubuntu Linux. Upon execution, it establishes persistence on the host by using SystemV or SystemD startup scripts and periodically contacts a remote server over TCP or UDP to fetch the commands to be run. DinodasRAT is equipped to perform file operations, change command-and-control (C2) addresses, enumerate and terminate running processes, execute shell commands, download a new version of the backdoor, and even uninstall itself. It also takes steps to evade detection by debugging and monitoring tools, and like its Windows counterpart, utilizes the Tiny Encryption Algorithm (TEA) to encrypt C2 communications. "DinodasRAT's primary use case is to gain and maintain access via Linux servers rather than reconnaissance," Kaspersky said. "The backdoor is fully functional, granting the operator complete control over the infected machine, enabling data exfiltration and espionage." The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. Take Action Fast with Censys Search for Security Teams Stay ahead of advanced threat actors with best-in-class Internet intelligence from Censys Search.

Daily Brief Summary

MALWARE // Multi-Platform DinodasRAT Malware Targets Global Linux Systems

Kaspersky detects a Linux variant of DinodasRAT targeting entities in China, Taiwan, Turkey, and Uzbekistan.

Originally known as XDealer, this C++ malware harvests sensitive data from compromised systems.

A Windows version of DinodasRAT was used in an espionage campaign against a Guyanese government entity.

Earth Krahang, linked to China, has incorporated DinodasRAT in recent government-targeted attacks.

The malware maintains persistence using startup scripts and communicates with C2 servers for commands.

DinodasRAT can manage files, alter processes, execute shell commands, and self-update or uninstall.

The malware evades detection tools and encrypts communications with the Tiny Encryption Algorithm (TEA).

DinodasRAT is primarily used for sustained access to Linux servers, enabling expansive control for data theft and espionage.