Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Watari-kun’s ****** Is about to Collapse’s Naru Narumi Launches New Manga in June – News

May 25, 2025

Gundam Creator Yoshiyuki Tomino to Speak at Space Business Conference – Interest

May 25, 2025

Gō Ikeyamada to End Takanashi-ke no Imōto wa Hanayome ni Naritaii!! Manga – News

May 25, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks
Cybersecurity

New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks

HarishBy HarishApril 16, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


Apr 16, 2025Ravie LakshmananCyber Espionage / Network Security

Lateral Movement in Linux Server Attacks

Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks targeting telecommunications, finance, and retail sectors in South Korea, Hong Kong, Myanmar, Malaysia, and Egypt in 2024.

“The controller could open a reverse shell,” Trend Micro researcher Fernando Mercês said in a technical report published earlier in the week. “This could allow lateral movement, enabling attackers to enter deeper into compromised networks, allowing them to control more systems or gain access to sensitive data.

The campaign has been attributed with medium confidence to a threat group it tracks as Earth Bluecrow, which is also known as DecisiveArchitect, Red Dev 18, and Red Menshen. The lower confidence level boils down to the fact that the BPFDoor malware source code was leaked in 2022, meaning it could also have bee adopted by other hacking groups.

Cybersecurity

BPFDoor is a Linux backdoor that first came to light in 2022, with the malware positioned as a long-term espionage tool for use in attacks targeting entities in Asia and the Middle East at least a year prior to public disclosure.

The most distinctive aspect of the malware is that it creates a persistent-yet-covert channel for threat actors to control compromised workstations and access sensitive data over extended periods of time.

The malware gets its name from the use of Berkeley Packet Filter (BPF), a technology that allows programs to attach network filters to an open socket in order to inspect incoming network packets and monitor for a specific Magic Byte sequence so as to spring into action.

“Because of how BPF is implemented in the targeted operating system, the magic packet triggers the backdoor despite being blocked by a firewall,” Mercês said. “As the packet reaches the kernel’s BPF engine, it activates the resident backdoor. While these features are common in rootkits, they are not typically found in backdoors.”

The latest analysis from Trend Micro has found that the targeted Linux servers have also been infected by a previously undocumented malware controller that’s used to access other affected hosts in the same network after lateral movement.

“Before sending one of the ‘magic packets’ checked by the BPF filter inserted by BPFDoor malware, the controller asks its user for a password that will also be checked on the BPFDoor side,” Mercês explained.

In the next step, the controller directs the compromised machine to perform one of the below actions based on the password provided and the command-line options used –

Open a reverse shell
Redirect new connections to a shell on a specific port, or
Confirm the backdoor is active

Cybersecurity

It’s worth pointing out that the password sent by the controller must match one of the hard-coded values in the BPFDoor sample. The controller, besides supporting TCP, UDP, and ICMP protocols to commandeer the infected hosts, can also enable an optional encrypted mode for secure communication.

Furthermore, the controller supports what’s called a direct mode that enables the attackers to directly connect to an infected machine and obtain a shell for remote access – but only when provided the right password.

“BPF opens a new window of unexplored possibilities for malware authors to exploit,” Mercês said. “As threat researchers, it is a must to be equipped for future developments by analyzing BPF code, which will help protect organizations against BPF-powered threats.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleThe ‘Oscars of Science’ can’t take a Trump joke
Next Article Hammerspace, an unstructured data wrangler used by Meta, raises $100M at $500M+ valuation
Harish
  • Website
  • X (Twitter)

Related Posts

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

May 23, 2025

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

May 23, 2025

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025

Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Watari-kun’s ****** Is about to Collapse’s Naru Narumi Launches New Manga in June – News

May 25, 2025

Gundam Creator Yoshiyuki Tomino to Speak at Space Business Conference – Interest

May 25, 2025

Gō Ikeyamada to End Takanashi-ke no Imōto wa Hanayome ni Naritaii!! Manga – News

May 25, 2025

Doraemon Dorayaki Shop Story Game Adds Hindi Language Support – News

May 25, 2025
Don't Miss
Blockchain

Industry exec sounds alarm on Ledger phishing letter delivered by USPS

May 24, 20252 Mins Read

Scammers posing as Ledger, a hardware wallet manufacturer, are sending physical letters to crypto users…

Decentralizing telecom benefits small businesses and telcos — Web3 exec

May 24, 2025

Wallet intelligence shapes the next crypto power shift

May 24, 2025

Hyperliquid trader James Wynn goes ‘all-in’ on $1.25B Bitcoin Long

May 24, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Khosla Ventures among VCs experimenting with AI-infused roll-ups of mature companies

May 23, 2025

What is Mistral AI? Everything to know about the OpenAI competitor

May 23, 2025

Marjorie Taylor Greene picked a fight with Grok

May 23, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.