Winnti Linux variant used in 2015 in the hack of a Vietnamese gaming company.
For the first time, security researchers have uncovered and analyzed a Linux variant of Winnti, one of the favorite hacking tools used by Beijing hackers over the past decade.
Discovered by security researchers from Chronicle, Alphabet’s cyber-security division, the Linux version of the Winnti malware works as a backdoor on infected hosts, granting attackers access to compromised systems.
Chronicle says it discovered this Linux variant after news broke last month that Bayer, one of the world’s largest pharmaceutical companies, had been hit by Chinese hackers, and the Winnti malware was discovered on its systems.
During subsequent scans for Winnti malware on its VirusTotal platform, Chronicle said it spotted what appeared to be a Linux variant of Winnti, dating back to 2015 when it was used in the hack of a Vietnamese gaming company.
CONNECTIONS TO WINDOWS VARIANT
Chronicle says the malware they discovered was made up of two parts. A rootkit component to hide the malware on infected hosts, and the actual backdoor trojan.
Further analysis revealed code similarities between the Linux version and the Winnti 2.0 Windows version, as described in reports by Kaspersky Lab and Novetta.
Other connections with the Windows version also included the similar way in which the Linux variant handled outbound communications with its command-and-control (C&C) server — which was a mixture of multiple protocols (ICMP, HTTP, and custom TCP and UDP protocols).
Last but not least, the Linux version also possessed another feature that was distinctive to the Windows version, which was the ability for Chinese hackers to initiate connections to infected hosts without going through the C&C servers.
“This secondary communication channel may be used by operators when access to the hard-coded control servers is disrupted,” Chronicle researchers said in a report published last week.
LINUX MALWARE IS RARE
The discovery of this Winnti Linux variant also shows that state-sponsored actors won’t shy away from porting their malware to any platform they feel necessary.
State hacker groups linked to the US and Russian governments are known to use Linux malware.
“Linux specific tooling from Chinese APTs is rare but not unheard of,” Silas Cutler, Reverse Engineering Lead at Chronicle, told ZDNet via email. “Historically, tools such as HKdoor, Htran, and Derusbi all had Linux variants.”
But despite this, Linux malware is quite rare among nation-state hacking groups, as a whole, especially when compared to Windows tools.
“The lower prevalence may be because Linux provides ample opportunity for actors to ‘live off the land’ which renders customized tooling unnecessary,” Cutler told us.
Fortune 100 passwords, email archives, and corporate secrets left exposed on unsecured Amazon S3 server
Fortune 100 passwords, email archives, and corporate secrets left exposed on unsecured Amazon S3 serverSome of the world’s biggest companies have had 750GB worth of their innermost secrets revealed on unsecured Amazon S3 buckets, available for anybody to download – no...
New Microsoft Excel Attack SurfacesResearchers have identified a security hole in Microsoft Office’s Excel spreadsheet program that allows an attacker to trigger a malware attack on remote systems. A feature in Microsoft Office’s Excel spreadsheet program called Power...
Malicious URL attacks using HTTPS surge across the enterpriseCyberattacks launched against the enterprise which makes use of the HTTPS protocol are increasing alongside spoofing and cloud-based threats, new research suggests. According to FireEye's Q1 2019 Email...
Stay Up to Date With The Latest News & Updates
Join Our Newsletter
Get weekly tech updates and immediate alerts when there is a zero-day or security issue!