New Linux malware is controlled through emojis sent from Discord
(www.bleepingcomputer.com)
from BrikoX@lemmy.zip to cybersecurity@sh.itjust.works on 16 Jun 2024 07:32
https://lemmy.zip/post/17455389
from BrikoX@lemmy.zip to cybersecurity@sh.itjust.works on 16 Jun 2024 07:32
https://lemmy.zip/post/17455389
A newly discovered Linux malware dubbed ‘DISGOMOJI’ uses the novel approach of utilizing emojis to execute commands on infected devices in attacks on government agencies in India.
threaded - newest
.
If you actually read it, the emojis are just a silly little C2 frontend, the actual attack vector has nothing to do with Discord
OP didn’t bother to write it, so I will. The infection vector is an executable distributed through mail, targeting computers of the Indian government.
So to get infected, you need to download and unpack a ZIP archive sent to you from an unknown address, then execute the file it contains? In that case, I’m not too worried.
Just like most malware
Especially Linux malware. It’s not a huge target, so it’s likely to be low effort stuff like this instead of zero-days attacking some linux-specific API. That level of attack is reserved for higher value targets, like servers and windows.
Linux servers are the biggest target though.
Exactly, because they’re high value targets, as I mentioned. But they’re going to use more exotic exploits than an attack on linux desktops, because the expected return vs work to get the exploit makes more sense. Grandma isn’t likely using linux to access her bank account, but she is likely accessing a linux server.
I never understood that claim. Most of the internet, most servers and most machine controllers, as well as most cloud services (including Microsoft Azure) run on Linux.
It’s the biggest target in the world.
Linux servers are, and I specifically called that out. The types of attacks you use against a server are very different than attacks against a desktop. Most desktops don’t run web servers, and most servers don’t run discord or web browsers.
So linux desktops should see a lot fewer attacks than servers because the value of successfully attacking them is much lower. As that changes, so will the amount of malware targeting linux desktops.
It’s more about C&C, novel ways to get around firewall restrictions. Deploying a payload is the hard part, but having control over a large botnet without raising red flags is an art as well.
Pretty clever to disguise the commands and replays as emojis. I bet it’s going to open yet another cat-and-mouse-game for pattern matching.
What happens if the victim dosen’t have discord installed on the PC? The virus have no way to get orders?
Didn’t sound like it uses the discord client but rather the malware connects directly to a server