Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Gundam Creator Yoshiyuki Tomino to Speak at Space Business Conference – Interest

May 25, 2025

Gō Ikeyamada to End Takanashi-ke no Imōto wa Hanayome ni Naritaii!! Manga – News

May 25, 2025

Doraemon Dorayaki Shop Story Game Adds Hindi Language Support – News

May 25, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Cybersecurity

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

HarishBy HarishApril 15, 2025No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Chinese Hackers Target Linux

The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant of a known malware dubbed SNOWLIGHT and a new open-source tool called VShell to infect Linux systems.

“Threat actors are increasingly using open source tools in their arsenals for cost-effectiveness and obfuscation to save money and, in this case, plausibly blend in with the pool of non-state-sponsored and often less technical adversaries (e.g., script kiddies), thereby making attribution even more difficult,” Sysdig researcher Alessandra Rizzo said in a report shared with The Hacker News.

“This seems to hold especially true for this particular threat actor, who has been under the radar for the last year since being affiliated with the Chinese government.”

UNC5174, also referred to as Uteus (or Uetus), was previously documented by Google-owned Mandiant as exploiting security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver a C-based ELF downloader named SNOWLIGHT, which is designed to fetch a Golang tunneler dubbed GOHEAVY from infrastructure tied to a publicly available command-and-control (C2) framework known as SUPERSHELL.

Cybersecurity

Also deployed in the attacks was GOREVERSE, a publicly available reverse shell backdoor written in Golang that operates over Secure Shell (SSH).

The French National Agency for the Security of Information Systems (ANSSI), in its Cyber Threat Overview report for 2024 published last month, said it observed an attacker employing similar tradecraft as that of UNC5174 to weaponize security flaws in Ivanti Cloud Service Appliance (CSA) such as CVE-2024-8963, CVE-2024-9380, and CVE-2024-8190 to gain control and execute arbitrary code.

“Moderately sophisticated and discreet, this intrusion set is characterized by the use of intrusion tools largely available as open source and by the – already publicly reported – use of a rootkit code,” the ANSSI said.

It’s worth noting that both SNOWLIGHT and VShell are capable of targeting Apple macOS systems, with the latter distributed as a fake Cloudflare authenticator application as part of an as-yet-undetermined attack chain, according to an analysis of artifacts uploaded to VirusTotal from China in October 2024.

In the attack chain observed by Sysdig in late January 2025, the SNOWLIGHT malware acts as a dropper for a fileless, in-memory payload called VShell, a remote access trojan (RAT) widely used by Chinese-speaking cybercriminals. The initial access vector used for the attack is presently unknown.

Specifically, the initial access is used to execute a malicious bash script (“download_backd.sh”) that deploys two binaries associated with SNOWLIGHT (dnsloger) and Sliver (system_worker), both of which are used to set up persistence and establish communications with a C2 server.

The final stage of the attack delivers VShell via SNOWLIGHT by means of a specially crafted request to the C2 server, thereby enabling remote control and further post-compromise exploitation.

“[VShell] acts as a RAT (Remote Access Trojan), allowing its abusers to execute arbitrary commands and download or upload files,” Rizzo said. “SNOWLIGHT and VShell pose a significant risk to organizations due to their stealthy and sophisticated techniques,” Sysdig said. “This is evidenced by the employment of WebSockets for command-and-control, as well as the fileless VShell payload.”

Cybersecurity

The disclosure comes as TeamT5 revealed that a China-nexus hacking group likely exploited security flaws in Ivanti appliances (CVE-2025-0282 and CVE-2025-22457) to gain initial access and deploy the SPAWNCHIMERA malware.

The attacks, the Taiwanese cybersecurity company said, targeted a multitude of sectors spanning nearly 20 different countries such as Austria, Australia, France, Spain, Japan, South Korea, Netherlands, Singapore, Taiwan, the United Arab Emirates, the United Kingdom, and the United States.

The findings also dovetail with accusations from China that the U.S. National Security Agency (NSA) launched “advanced” cyber attacks during the Asian Winter Games in February, pointing fingers at three NSA agents for repeated attacks on China’s critical information infrastructure as well as against Huawei.

According to the National Computer Virus Emergency Response Center (CVERC), the U.S. is alleged to be behind more than 170,000 cyber attacks between January 26 and February 14, 2025, followed by Singapore, the Netherlands, Germany, and South Korea. In all, the Games’ information systems were targeted by 270,167 attacks from abroad.

“At the ninth Asian Winter Games, the U.S. government conducted cyberattacks on the information systems of the Games and the critical information infrastructure in Heilongjiang,” Foreign Ministry Spokesperson Lin Jian said. “This move is egregious for it severely endangers the security of China’s critical information infrastructure, national defense, finance, society, and production as well as its citizens’ personal information.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleCritical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence
Next Article Nothing in common but a token crash
Harish
  • Website
  • X (Twitter)

Related Posts

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

May 23, 2025

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

May 23, 2025

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025

Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Gundam Creator Yoshiyuki Tomino to Speak at Space Business Conference – Interest

May 25, 2025

Gō Ikeyamada to End Takanashi-ke no Imōto wa Hanayome ni Naritaii!! Manga – News

May 25, 2025

Doraemon Dorayaki Shop Story Game Adds Hindi Language Support – News

May 25, 2025

Betrothed to My Sister’s Ex Anime Reveals More Cast, July 4 TV Debut in 2nd Promo Video – News

May 25, 2025
Don't Miss
Blockchain

Industry exec sounds alarm on Ledger phishing letter delivered by USPS

May 24, 20252 Mins Read

Scammers posing as Ledger, a hardware wallet manufacturer, are sending physical letters to crypto users…

Decentralizing telecom benefits small businesses and telcos — Web3 exec

May 24, 2025

Wallet intelligence shapes the next crypto power shift

May 24, 2025

Hyperliquid trader James Wynn goes ‘all-in’ on $1.25B Bitcoin Long

May 24, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Khosla Ventures among VCs experimenting with AI-infused roll-ups of mature companies

May 23, 2025

What is Mistral AI? Everything to know about the OpenAI competitor

May 23, 2025

Marjorie Taylor Greene picked a fight with Grok

May 23, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.