Monday, April 28, 2025
Homecyber securityChinese Hackers Attacking Linux Devices With New SSH Backdoor

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, targeting Linux systems through an advanced Secure Shell (SSH) backdoor known as ELF/Sshdinjector.A!tr.

This malware, part of a broader attack framework, compromises Linux-based network appliances and Internet-of-Things (IoT) devices, enabling data exfiltration and prolonged persistence within compromised environments.

Discovered in mid-November 2024, the backdoor was utilized during the Lunar Peek campaign, a coordinated series of attacks on network appliances.

- Advertisement - Google News

Analysis by FortiGuard Labs reveals that the attack deploys a combination of malicious components, including a dropper, a malicious SSH library (libsshd.so), and other files designed to maintain infection and avoid detection.

Infection Mechanics

The malware initiates with a dropper binary, which verifies the host’s root privileges before infection.

If the target is deemed vulnerable, the dropper overwrites key system binaries such as ls, netstat, and crond with malicious versions.

It also infects the SSH daemon using the libsshd.so file, which serves as the primary payload.

The core backdoor functionality resides in libsshd.so, enabling communication with a remote command-and-control (C2) server at a hard-coded IP address.

It executes a range of malicious activities, including:

  • Exfiltration of system data such as MAC addresses and configuration details.
  • Listing and reading sensitive system files, including /etc/shadow.
  • File manipulation and the ability to execute commands on the compromised system.
  • Persistence through automated restarting of SSH and Cron daemons.

According to the FortiNet report, the malware operates using a custom protocol for encrypted communication with the C2 server and employs unique identifiers for tracking compromised hosts.

Technical Analysis

Through advanced reverse engineering, supported by AI tools like r2ai, researchers pieced together the intricate behavior of ELF/Sshdinjector.A!tr.

SSH Backdoor
Overview of ELF/Sshdinjector

The use of AI facilitated rapid disassembly and source-code generation, although challenges such as hallucinated functionalities and omitted details required human oversight.

The collaboration between human analysts and AI allowed for in-depth decoding of the malware’s functionality, highlighting the potential but imperfect nature of AI in threat analysis workflows.

DaggerFly’s use of ELF/Sshdinjector.A!tr underscores the growing sophistication of attacks targeting Linux platforms, particularly IoT and network appliances, which often lack robust security measures.

The campaign’s ability to exfiltrate data and maintain stealth illustrates the critical need for enhanced security protocols for Linux-based systems.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...