Follow

Next-Gen Malware Takes Over Devices With Unique Tool Set

The Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cryptominer, and allows full remote control

Article by Tara Seals

twitter.com/wirelesswench

darkreading.com/vulnerabilitie

@ecksmc

"Further notable capabilities in the malware include the use of the "Shikata Ga Nai" polymorphic encoder to thwart detection by antivirus engines; and the abuse of legitimate cloud services to store command-and-control servers (C2s). According to the research, the C2s can be used to send various shell commands to the malware, allowing attackers full control over the target."

So it begins- 🤬

@ecksmc oh dear, so what does that mean for your average Linux user. I have to admit the technical elements of that article mostly went over my head.

@Booga only advice i can offer is make sure all patches available for OS are installed 👍

Personally i haven't got a Linux machine mostly play around with different Linux OSes in a VM or duel booted on my Chromebook for tinkering around with

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.