IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

FontOnLake: "Sophisticated" malware targets Linux systems

The malware stands out for its ability to maintain persistence on the infected system

Security researchers have uncovered new malware dubbed “FontOnLake” that is being used in a new campaign that targets Linux systems.

Present since at least May 2020, according to samples uploaded to VirusTotal, the malware stands out for its ability to maintain persistence on the infected system and for the sophistication of its design.

Its installation is done through modified and trojanized versions of popular Linux commands, normally present in the coreutils package or installed by default on some systems. These commands include cat, kill, sftp, and sshd, and often launch at system startup and allow the malware to be persistent. They are also used to install custom backdoors and rootkits.

Researchers have discovered three custom backdoors written in C ++, which are related to FontOnLake malware and provide operators with remote access to the infected system.

“All the trojanized files are standard Linux utilities and each serves as a persistence method because they are commonly executed on system start-up. The initial way in which these trojanized applications get to their victims is not known,” said Vladislav Hrčka, malware analyst and reverse engineer at ESET.

Once the malware is on the system, it uses the installed backdoors to retrieve credentials and Bash history, and then sends them to its command and control (C&C) server. The rootkits in turn are used to allow malware to hide its existence and activities on the system of the victim.

Related Resource

How to secure workloads in hybrid clouds

Cloud workload protection

Whitepaper front coverFree download

The communication between trojanized apps and rootkit is done through a virtual file created by the latter. An operator can read or write data to this file and extract it from the backdoor component.

Researchers suspect that FontOnLake is being used for targeted attacks. Its creators are also careful: different C&C servers are used in each of the samples on VirusTotal and have since been deactivated. Analysis seems to indicate that the virus is present in Southeast Asia. Some of the samples show that Debian and CentOS are among the targeted distributions.

ESET says FontOnLake may be the same malware that was previously analyzed by researchers at the s Tencent Security Response CenterAvast, and Lacework Labs.

“Companies or individuals who want to protect their Linux endpoints or servers from this threat should use a multilayered security product and an updated version of their Linux distribution,” said Hrčka.

Featured Resources

The 3D skills report

Add 3D skills to your creative toolkits and play a sizeable role in the digital future

Free Download

The increasing need for environmental intelligence solutions

How sustainability has become a major business priority and is continuing to grow in importance

Free Download

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

Solve global challenges with machine learning

Tackling our word's hardest problems with ML

Free Download

Recommended

Threat hunting for MSPs
Whitepaper

Threat hunting for MSPs

10 Jan 2023
IBM LinuxONE for dummies
Whitepaper

IBM LinuxONE for dummies

4 Jan 2023
Six myths of SIEM
Whitepaper

Six myths of SIEM

3 Jan 2023
Storage's role in addressing the challenges of ensuring cyber resilience
Whitepaper

Storage's role in addressing the challenges of ensuring cyber resilience

3 Jan 2023

Most Popular

What's powering Britain’s fibre broadband boom?
Network & Internet

What's powering Britain’s fibre broadband boom?

3 Feb 2023
Dutch hacker steals data from virtually entire population of Austria
data breaches

Dutch hacker steals data from virtually entire population of Austria

26 Jan 2023
Windows 10 users locked out of devices by unskippable Microsoft 365 advert
bugs

Windows 10 users locked out of devices by unskippable Microsoft 365 advert

3 Feb 2023