Saturday, August 13, 2022
Advertisement
Firnco
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification
No Result
View All Result
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification
No Result
View All Result
Firnco
No Result
View All Result
Home Cybersecurity News

Lightning Framework: Some other Succesful Linux Malware | Cyware Signals

July 26, 2022
in Cybersecurity News
Reading Time: 2 mins read
0
Lightning Framework: Some other Succesful Linux Malware | Cyware Signals
74
SHARES
1.2k
VIEWS
Share on Twitter

A prior to now unknown malware, Lightning Framework, has been noticed concentrated on Linux programs. The framework can be utilized to backdoor units the usage of SSH and ship various kinds of rootkits.

Lightning Framework

In line with Intezer, Lightning Framework is a modular malware that incorporates passive and lively functions for communique with the attacker.
  • The malware opens SSH on an inflamed device and helps polymorphic malleable command and regulate configuration. At this time, parts referenced within the supply code are but to be came upon.
  • The framework makes use of typosquatting and masquerades because the Seahorse GNOME password and encryption key supervisor to keep away from being detected at the inflamed programs.

Malware structure

Lightning Framework contains two primary modules Lightning[.]Downloader and Lightning[.]Core.

  • Lightening.Core is the primary module of the framework, which receives instructions (C2) and executes its plugins.
  • Lightning[.]Downloader is a downloader element to obtain and set up different modules and plugins.
  • As for downloaded plugins, the framework helps more than one plugins, together with Linux.Plugin.RootkieHide, Linux.Plugin.Kernel, and Linux.Plugin.Lightning.iptraf, amongst others.

Further functions

The Lightening.Core module (kkdmflush) makes use of quite a few ways to masks artifacts to stick undetected for longer and accomplish patience.
  • Tips on how to cover come with tampering with the malicious artifacts’ timestamps with time stomping and hiding its Procedure ID (PID) and comparable community ports the usage of probably the most deployed rootkits.
  • For patience, it creates a script named elastisearch at /and so forth/rc[.]d/init[.]d/ location that runs each and every time the device boots to execute the downloader module and re-infect the tool.

Conclusion

Lightning Framework is a possible Linux malware that may backdoor or compromise units, and stands as a perilous risk to the safety group. Keep protected the usage of a competent anti-malware resolution and let’s now not skip on risk intel platforms to mitigate such rising threats.
Tweet19

Recommended For You

Google Might Upload House Workout routines to Its Good TV Choices

August 13, 2022
Google Might Upload House Workout routines to Its Good TV Choices

Identical to the ones fitness-obsessed tv hosts Hans and Franz, Google desires to pump you up.The corporate is hatching plans so as to add fitness-tracking tech and strengthen...

Read more

10 Absolute best Laptops (2022): MacBooks, Home windows, Chromebooks

August 13, 2022
10 Absolute best Laptops (2022): MacBooks, Home windows, Chromebooks

Purchasing any computer is a huge resolution. You might finally end up the use of it for a number of years earlier than getting some other, and there...

Read more

Our 12 Favourite Paper Planners (2022): Planners, Pens, Stickers, and 1 Virtual Instrument

August 13, 2022
Our 12 Favourite Paper Planners (2022): Planners, Pens, Stickers, and 1 Virtual Instrument

Purchasing a brand new planner provides an endorphin rush like no different, whether or not it’s for a brand new faculty semester, paintings 12 months, or only a...

Read more

US unmasks alleged Conti ransomware operative, provides $10M for intel – TechCrunch

August 13, 2022
US unmasks alleged Conti ransomware operative, provides $10M for intel – TechCrunch

The U.S. executive mentioned it is going to be offering as much as $10 million for info similar to 5 other folks believed to be high-ranking participants of...

Read more

30 Perfect Again-to-Faculty Offers (2022): Laptops, Pills, Headphones, and Extra

August 13, 2022
30 Perfect Again-to-Faculty Offers (2022): Laptops, Pills, Headphones, and Extra

back-to-school season is formally right here. Whether or not you might be heading again to a bodily or digital lecture room, beginning a brand new college 12 months...

Read more
Next Post
Amazon RDS for MariaDB helps new minor variations 10.6.8, 10.5.16, 10.4.25, 10.3.35, 10.2.44

Introducing the re-Introduced AWS Safety Competency

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Make a choice the correct measurement in your workload with NVads A10 v5 digital machines, now in most cases to be had | Azure Weblog and Updates

Azure empowers easy-to-use, high-performance, and hyperscale style coaching the usage of DeepSpeed | Azure Weblog and Updates

July 26, 2022
Chromium web page isolation bypass permits wide variety of assaults on browsers

Chromium web page isolation bypass permits wide variety of assaults on browsers

August 5, 2022
In finding your answer extra simply with our new Answer
Finder

In finding your answer extra simply with our new Answer Finder

August 4, 2022

Browse by Category

  • Black Hat
  • Breach
  • Cloud Computing
  • Cloud Security
  • Cybersecurity News
  • Hacks
  • InfoSec Insider
  • IoT
  • Malware
  • Malware Alerts
  • News
  • Podcasts
  • Privacy
  • Sponsored
  • Tutorials & Certification
  • Vulnerabilities
  • Web Security
Firnco

© 2022 | Firnco.com

66 W Flagler Street, suite 900 Miami, FL 33130

  • About Us
  • Home
  • Privacy Policy

305-647-2610 [email protected]

No Result
View All Result
  • Home
  • Cloud Computing
  • Cybersecurity News
  • Tutorials & Certification

© 2022 | Firnco.com

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?