Saturday, April 12, 2025
Homecyber securityAuto-Color Linux Backdoor: TTPs and Internal Architecture Exposed

Auto-Color Linux Backdoor: TTPs and Internal Architecture Exposed

Published on

SIEM as a Service

Follow Us on Google News

A newly identified Linux backdoor named “Auto-Color,” first observed between November and December 2024, has been targeting government organizations and universities across North America and Asia.

This malware, initially disguised as a benign color-enhancement tool, employs sophisticated tactics, techniques, and procedures (TTPs) to infiltrate systems and maintain persistent access.

Technical Analysis

Auto-Color employs several evasion techniques to avoid detection. It dynamically resolves APIs at runtime, making static detection more challenging.

- Advertisement - Google News

According to the Report, the malware’s string encryption hides its functionality, complicating analysis.

Linux Backdoor
Malware Installation function

Upon execution, it checks for root privileges to deploy its full suite of advanced tactics:

  • String Encryption: Uses XOR operations to obfuscate its strings, making it difficult for analysts to understand its intentions at first glance.
  • Installation: When installed, Auto-Color creates a directory at /var/log/cross, which it populates with system logs to blend in. It then copies itself into this folder under the name “auto-color,” setting permissions to 777 to ensure read, write, and execute access.
  • Library Injection: It drops a shared library libcext.so.2, designed to mimic a legitimate system library, into the system’s library path. This library is used to hook critical functions, thereby intercepting and altering system calls related to file operations, permissions, and network activities.

Internal Architecture

The internal architecture of Auto-Color reveals a robust framework for maintaining persistence and stealth:

  • Persistence: To ensure continuous operation, Auto-Color integrates with system daemons like cron, auditd, and acpid by forking itself into these processes, thus leveraging their persistence for its own.
  • Network Activity Evasion: It hooks file access functions to manipulate /proc/net/tcp, filtering out its own C2 communications to hide from network monitoring tools.
  • Command and Control (C2): Auto-Color uses encrypted TCP sockets to connect to its C2 server. It employs a handshake mechanism involving pseudo-random number generation for authentication, ensuring secure command execution.
Linux Backdoor
Main function

Auto-Color can execute a suite of commands directed from its C2 server:

  • System Information Collection: It can gather system details including IP addresses, total memory, and OS version, sending this back to the attacker.
  • File and Directory Operations: Commands allow for reading, writing, deleting, renaming, and manipulating files or directories.
  • Reverse Shell Creation: Upon command, it opens a reverse shell, providing attackers with interactive access to the compromised host.
  • Proxy Functionality: The malware can act as a proxy, facilitating connections between the attacker and another target system.

The exposure of Auto-Color’s TTPs and internal architecture provides critical insights into its operations, potentially aiding in the development of effective countermeasures.

Security teams are urged to update their detection mechanisms and review their systems for signs of this backdoor, given its sophisticated means of evasion and persistence.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...