Next-Gen #Linux Malware Takes Over Devices With Unique Tool Set
The Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cryptominer, and allows full remote control
Article by Tara Seals
@ecksmc oh dear, so what does that mean for your average Linux user. I have to admit the technical elements of that article mostly went over my head.
@Booga only advice i can offer is make sure all patches available for OS are installed 👍
Personally i haven't got a Linux machine mostly play around with different Linux OSes in a VM or duel booted on my Chromebook for tinkering around with
@ecksmc
"Further notable capabilities in the malware include the use of the "Shikata Ga Nai" polymorphic encoder to thwart detection by antivirus engines; and the abuse of legitimate cloud services to store command-and-control servers (C2s). According to the research, the C2s can be used to send various shell commands to the malware, allowing attackers full control over the target."
So it begins- 🤬