How an Interdiction Mindset Can Help Win War on Cyberattacks

The US military and law enforcement learned to outthink insurgents. It’s time for cybersecurity to learn to outsmart and outmaneuver threat actors with the same framework.

darkreading – ​Read More

How to Hunt and Investigate Linux Malware 

Linux cyber threats may be less common than Windows ones, but they can be equally if not more damaging. Defending against these requires proactive efforts.

Eric Parker, a popular YouTube blogger and malware analyst, recently showed his approach to investigating and collecting intelligence on Linux malware.

Here is a recap of his video. 

How to find Linux malware in Threat Intelligence Lookup 

TI Lookup offers a centralized database of fresh IOCs, IOAs, and IOBs. It lets you search across threat data extracted from the latest malware and phishing samples analyzed by over 500,000 professionals and 15,000 companies around the globe in ANY.RUN’s Interactive Sandbox

To start searching for Linux threats in TI Lookup, we can begin with the search query specifying the Ubuntu OS version used in the Interactive Sandbox. 

Here is the query:  

os:”22.04.2” 

TI Lookup displaying results for the query 

Among the results, we can see shell scripts, malware, and can get an idea of what indicators of compromise there are.  

Try threat hunting with TI Lookup
Get 50 trial requests to collect your first intel 



Try now


Example 1: XORbot 

One of the files we found here is tagged XORbot. It’s a botnet primarily targeting Linux systems. 

Sandbox analysis sessions featuring XORbot displayed by TI Lookup 

Let’s explore one of the samples. 

View sample analysis 

Analysis of XORbot in ANY.RUN’s Interactive Sandbox 

The sandbox instantly shows numerous connection requests made by the botnet.  

ANY.RUN’s Interactive Sandbox displays flags suspicious activity

The malware also modifies ownership on the system and downloads additional payloads. 

Let’s move on to the next type of malicious software that you can find with TI Lookup, stealers

Example 2: Linux Stealer  

To find Linux stealers, we can simply combine the OS parameter with the threatName one. Here is the query we can submit to TI Lookup: 

os:”22.04.2″ and threatName:”stealer” 

TI Lookup displays results for Linux stealers 

Although the list of stealer samples can hardly match that of Linux botnets, we can still find an interesting one to explore. 

View analysis of Linux stealer 

Stealer malware analyzed in ANY.RUN’s Interactive Sandbox 

This one has an impressive list of malicious functionalities: 

  • It immediately begins to mine crypto using the system’s resources 
  • Joins a botnet and later can be used for conducting DDoS attacks 
Suricata IDS inside ANY.RUN’s Interactive Sandbox pointing to crypto mining activity
  • Steals files and credentials from the potential victim 
  • Scans other Linux devices for vulnerabilities using Shodan

Enhance your threat hunting flow with ANY.RUN’s Interactive Sandbox
Analyze threats fast and with ease 



Sign up with business email


What Makes Linux Malware Different 

The big thing you are probably starting to notice is that Linux malware is very different from Windows malware. It is not usually targeting a desktop user. 

It’s not likely to have a campaign like email attachments or fake Fortnite swappers.  

Those do very rarely exist, but because very few people use Linux as their primary desktop operating system, it’s much easier to target servers.  

This puts at risk corporate infrastructure and makes it particularly important for companies to use proper tools for proactive security like ANY.RUN’s Threat Intelligence Lookup and Interactive Sandbox. 

Reach out to us to learn how they can help your company.

Example 3: Mirai Botnet 

Let’s take one more look at a common Linux botnet. 

To find samples of Linux botnets, we submit the following search query to TI Lookup: 

os:”22.04.2″ and threatName:”botnet” 

Sandbox reports featuring analyses of Linux botnets displayed by TI Lookup  

Let’s pick this sandbox session, which includes analysis of the Moobot version of Mirai. 

The Interactive Sandbox instantly detects Mirai’s activity with Suricata IDS 

The infection starts with the download of x86.elf file, which is the process that seems to start, then it goes through and then it ultimately gets deleted, which is another stealthing technique. 

If we watch a sandbox session replay – nothing visibly happens which is very common with this kind of malware: on the system that it is targeting, there wouldn’t even be a graphical user interface.  

Process analysis inside ANY.RUN’s Interactive Sandbox 

The only way you might be able to detect it is if you went through the processes, which can be done thanks to ANY.RUN’s real-time logging of all processes and system activities. 


Enrich your threat knowledge with TI Lookup

Enrich your threat knowledge with TI Lookup

Learn about TI Lookup and its capabilities to see how it can contribute to your company’s security



Secure Your Company Against Linux Threats 

So how do you prevent Linux malware? The main thing is – watch out and make sure you don’t have a weak root password on your system. 

To investigate and collect proactive intelligence on Linux threats that may target your infrastructure, use Threat Intelligence Lookup. 

With TI Lookup, your company can streamline: 

  • Proactive Threat Identification: Search the database to proactively identify and update your defense based on the discovered intelligence.  
  • Faster Research: Accelerate threat research by quickly connecting isolated IOCs to specific threats or known malware campaigns.  
  • Real-Time Monitoring: Monitor evolving threats by receiving updates on new results related to your indicators of interest.  
  • Incident Forensics: Enhance forensic analysis of security incidents by searching for contextual information on existing artifacts.  
  • IOC, IOB, and IOA Collection: Discover additional indicators by searching the database for relevant threat information. 

About ANY.RUN

ANY.RUN helps more than 500,000 cybersecurity professionals and 15,000 organizations worldwide. The Interactive Sandbox simplifies malware analysis of threats that target both Windows and Linux systems. The threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.

Integrate ANY.RUN’s Threat Intelligence suite in your organization →

The post How to Hunt and Investigate Linux Malware  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Augment Code debuts AI agent with 70% win rate over GitHub Copilot and record-breaking SWE-bench score

Credit: VentureBeat made with Midjourney


Augment Code launches AI technology that outperforms GitHub Copilot by 70% through real-time context understanding of massive codebases, securing $270M funding and achieving the highest score on SWE-bench verified.Read More

Security News | VentureBeat – ​Read More

KeePass Review (2025): Features, Pricing, and Security

While its downloadable plugins make it highly customizable, KeePass’ unintuitive interface holds it back from one of our top password manager picks.

Security | TechRepublic – ​Read More

Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers

Introduction
As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and maintaining compliance with industry regulations. The National Institute of Standards and Technology (NIST) offers a comprehensive set of frameworks that provide a clear path to achieving robust cybersecurity practices.
For service providers, adhering to NIST

The Hacker News – ​Read More

Questions Remain Over Attacks Causing DrayTek Router Reboots

DrayTek has shared some clarifications regarding the recent attacks causing router reboots, but some questions remain unanswered. 

The post Questions Remain Over Attacks Causing DrayTek Router Reboots appeared first on SecurityWeek.

SecurityWeek – ​Read More

Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks

North Korea’s Lazarus hackers are using the ClickFix technique for malware deployment in fresh attacks targeting the cryptocurrency ecosystem.

The post Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users

Gmail now allows enterprise users to send end-to-end encrypted emails to colleagues, and will soon allow sending to any inbox.

The post Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users appeared first on SecurityWeek.

SecurityWeek – ​Read More

Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities

Chrome 135 and Firefox 137 were released on Tuesday with fixes for several high-severity memory safety vulnerabilities.

The post Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

SecurityWeek – ​Read More

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan of the same name) that can grant them remote access to compromised Windows systems.
“This malware allows attackers to execute remote shell commands and other system operations, giving them full control over an infected machine,” Swiss

The Hacker News – ​Read More