Linux malware RotaJakiro went unnoticed for three years

The Chinese security team Qihoo 360 Netlab discovered the Linux malware RotaJakiro, which went unnoticed by VirusTotal for three years.

The backdoor was discovered in the course of analysing suspicious traffic from one of the system processes identified during the analysis of the structure of the botnet used for the DDoS attack.

Prior to this, RotaJakiro remained unnoticed for three years, in particular, the first attempts to check files with MD5 hashes in the VirusTotal service that match the detected malware were dated May 2018.

Malicious software disguises its activities using encryption and compression techniques and program names very similar to standard Linux system programs. The names of the programs are different depending on whether RotaJakiro is running on behalf of the main system administrator or a regular user.

The malware is not an exploit; rather, it is a payload that opens a backdoor on the target machine. It can be installed by an unsuspecting user, an attacker, or through a Trojan dropper.

At the moment, experts do not fully understand the mechanism of its work, but now they have discovered 12 functions, including those aimed at extracting and stealing data, managing files and plugins, as well as messaging the transfer of information about the device.

“At the coding level, RotaJakiro uses techniques such as dynamic AES, two-layer encrypted communication protocols, to counter the analysis of binary and network traffic. At the functional level, RotaJakiro first determines whether a user is root or non-root, at runtime, with different execution policies for different accounts, then decrypts the corresponding sensitive resources with AES & ROTATE to save, protect the process, and use a single instance later, and, finally establishes communication with C2 and waits for the commands issued by C2 to execute”, — Qihoo 360 Netlab experts say.

Let me remind you that I talked about the fact that FreakOut malware attacks Linux systems and uses them for DDoS and mining, as well as that Malware for Linux Kobalos attacks supercomputers.

William Reddy

I am from Ireland. My parents bought me a computer when I was 11, and several month after I have got a virus on this PC. I decided to enter the INSA Centre Val de Loire university after being graduated from the school. This French educational institution was offering a brand-new cybersecurity course. After getting the master degree in cybersecurity, I've started working in as virus analyst in a little anti-malware vendor. In 2018, I've decided to start Virus Removal project. The main target of this site is to help people to deal with PC viruses of any kind.

Leave a Reply

Your email address will not be published. Required fields are marked *


Back to top button