Dangerous ‘Lightning Framework’ Linux malware installs rootkits, backdoors

Dangerous ‘Lightning Framework’ Linux malware installs rootkits, backdoors

A new and previously undetected malware dubbed ‘Lightning Framework’ targets Linux systems and can be used to backdoor infected devices using SSH and deploy multiple types of rootkits.

Described as a “Swiss Army Knife” in a report published today by Intezer, Lightning Framework is a modular malware that also comes with support for plugins.

“The framework has both passive and active capabilities for communication with the threat actor, including opening up SSH on an infected machine, and a polymorphic malleable command and control configuration,” Intezer security researcher Ryan Robinson said.

This malware is yet to be spotted in the wild, and some of its components (referenced in the source code) are yet to be found and analyzed.

Lightning Framework is built using a simple structure: a downloader component that will download and install the malware’s other modules and plugins, including its core module, on compromised Linux devices.

The malware uses typosquatting and will masquerade as the Seahorse GNOME password and encryption key manager to evade detection on infected systems.

After reaching out to its command-and-control (C2) server over TCP sockets using C2 info stored in undetectable polymorphic encoded configuration files, Lightning Framework fetches its plugins and the core module.

Dangerous ‘Lightning Framework’ Linux malware installs rootkits, backdoors

This core module (kkdmflush) is the framework’s main module and is the one the malware uses to receive commands from its C2 server and to execute its plugins.

“The module has many capabilities and uses a number of techniques to hide artifacts to remain running under the radar,” Robinson added.

Other methods to hide its presence include altering malicious artifacts’ timestamps using timestomping and hiding its Process ID (PID) and any related network ports using one of several rootkits it can deploy.

Recommended:  U.S, UK warn local governments, businesses of China's influence operations

It can also achieve persistence by creating a script named elastisearch under at /etc/rc.d/init.d/ that gets executed on each system boot to launch the downloader module and reinfect the device.

Last but not least, this malware will also add its own SSH-based backdoor by starting an SSH server using one of the downloaded plugins (Linux.Plugin.Lightning.Sshd).

The newly launched OpenSSH daemon has hardcoded private and host keys, enabling attackers to SSH into the infected machines using their own SSH keys.

“The Lightning Framework is an interesting malware as it is not common to see such a large framework developed for targeting Linux,” Robinson concluded.

“Although we do not have all the files, we can infer some of the missing functionality based on strings and code of the modules that we do possess.”

Signs of a Linux malware surge?

Lightning Framework is just the latest Linux malware strain capable of fully compromising and backdooring devices that surfaced recently.

Intezer security researchers have also spotted OrBit, a stealthy malware that hijacks shared libraries to intercept function calls to steal information from backdoored Linux systems and infect all running processes.

Symbiote, another malware targeting Linux devices jointly analyzed by BlackBerry and Intezer researchers, acts as a system-wide parasite leaving no signs of infection and uses the same tactic to load itself into running processes.

Researchers have also spotted a stealthy backdoor named BPFDoor has been stealthily targeting Linux and Solaris systems undetected for over five years, bypassing firewalls for remote access.

A fourth Linux malware strain, a rootkit dubbed Syslogk unveiled by Avast researchers last month, has the capability to force-load its modules into the Linux kernel, backdoor infected machines, and hide network traffic and artifacts to evade detection.

Recommended:  Warning: Log4j Still Lurks Where Dependency Analysis Can’t Find It

“Malware targeting Linux environments surged in 2021, with a large amount of innovation resulting in new malicious code, especially in ransomwares, trojans, and botnets,” Robinson said.

“With the rise in use of the cloud, it is no wonder that malware innovation is still accelerating at breakneck speed in this realm.”

Suggest an edit to this article

Go to Cybersecurity Knowledge Base

Got to the Latest Cybersecurity News

Go to Cybersecurity Academy

Go to Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
RiSec.n0tst3
Connect
Latest posts by RiSec.n0tst3 (see all)
Recommended:  Weblizar 8.9 Backdoor - WordPress Plugin
Share the word, let's increase Cybersecurity Awareness as we know it

Leave a Comment

Your email address will not be published. Required fields are marked *

RiSec Captcha 5 + 3 =