• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

New HiddenWasp Linux Malware Focused Solely on Achieving Targeted Remote Control

{{postValue.id}}

HiddenWasp, a new Linux Threat that is different from other Linux malware focused solely on achieving targeted remote control of infected hosts is on the rise now.

Analyzing recent samples of this new malware, Intezer, in its blog, stated that HiddenWasp's architecture generally consists of three parts.

  • A script responsible for injecting the malware onto a clean machine or for updating its existing versions of the threat on an already infected host.

  • A rootkit that appeared to use code borrowed from Mirai to lock into several functions.

  • A Trojan containing apparent code connections to the Elknot implant that works with the root-kit to remain operational.

The Trojan searches for Linux systems in the targeted network using this mutually beneficial relationship for the purpose of achieving remote control.

Targeted remote control isn't the usual objective of Linux-based malware, these types of digital threats usually pursue one of two other objectives. One of these goals involve launching distributed denial-of-service (DDoS) attacks against targeted systems.

For instance, unixfreaxjp recently discovered new malware called Linux/DDoSMan, which at time of discovery, functioned as a DDoS botnet client installer.

The other common function is mining for crypto-currency. Just after unixfreaxjp's research, Trend Micro observed that recent samples of Bashlite, a malware for enlisting vulnerable Internet of Things (IoT) devices into DDos Botnets, had added both backdoor- related and crypto-mining capabilities.

HiddenWasp threat can be defended by taking help from security professionals and their organizations by using Artificial Intelligence to spot digital attacks that might succeed in escaping rule-based security measures. Additionally, organizations should use a unified endpoint management(UEM) tool to monitor their endpoints for suspicious activity which could be indicative of malware.

Tags:
lucas
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 0 )

No questions available

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Ryan ?
how to use visual traceroute tool

Am using traceroute command to check for the route. i got this tool while surfing. So pls help me out installation and usage of Visual traceroute tool.

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.