A new modular Linux malware has been recently detected by ESET that is dubbed as FontOnLake. And this malware has many features, one of them is “well-designed modules.”
This feature is very well designed and is continuously being updated with an extensive range of skills, which generally indicates an active development stage.
However, the malicious code was utilized by the threat actors to negotiate all the data from infected systems and performances as a proxy server.
FontOnLake is quite dangerous in nature, as the malware has different modules that communicate with one another and simply allow communication with malware operators, after doing that it steals sensitive data, and keeps itself hidden on the system.
FontOnLake is likely practiced in targeted attacks by operators that are adequately careful to utilize the unique command and control (C2) servers for samples and different non-standard ports.
FontOnLake’s components have been divided into three following groups that generally communicate with each other, and here we have mentioned them below:-
In this malware, the threat actors have used several trojanized apps to load custom backdoor as well as rootkit modules. All the applications that are present in this malware serve as a constancy method
Since they are mostly used in start-ups, and not only this even all the trojanized files are standard Linux utilities.
There are two different versions of the rootkit, and those are used only one at a time. However, there are some similar functions of both the rootkit that were being discovered, and here we have mentioned them below:-
In this malware, there are three different backdoors that are written in C++, and all the backdoors exfiltrate the data that has been collected. All these different backdoors are not applied together on one negotiated system.
Apart from this, all the backdoors use custom heartbeat commands that are probably sent and received regularly so that the connection stays alive.
The operators of this malware are well trained and know the exact way of implementing the attack. While most of the features of the malware are specifically designed to hide the presence, relay information, and implement backdoor access.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path…
Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept…
A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been…
Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By…
Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved…
CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding…