Thursday, May 8, 2025
HomeCyber Security NewsLinux Malware perfctl Attacking Millions of Linux Servers

Linux Malware perfctl Attacking Millions of Linux Servers

Published on

SIEM as a Service

Follow Us on Google News

Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide.

This malicious software exploits over 20,000 types of server misconfigurations, posing a significant threat to any Linux server connected to the internet.

The malware’s stealthy nature and advanced evasion techniques make it particularly challenging to detect and mitigate.

- Advertisement - Google News

The Rise of Perfctl: A New Threat in the Cyber Landscape

The perfctl malware has been a growing concern in developer forums and online communities for the past few years.

It has been linked to numerous incidents involving compromised Linux servers. The malware’s name derives from its ability to blend in with legitimate system processes, making it harder for administrators to identify.

By combining elements from standard Linux tools like “perf” (a performance monitoring tool) and “ctl” (indicating control), the malware authors have crafted a seemingly innocuous name that masks its malicious intent.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

Understanding Perfctl’s Architecture and Attack Flow

According to the Aqua Nautilus reports, Perfctl is designed with multiple execution layers to ensure persistence and evade detection.

Once it exploits a vulnerability or misconfiguration, the main payload is downloaded from an attacker-controlled server. Initially named “httpd,” this payload copies itself into various locations on the disk, using deceptive names to avoid detection.

It also employs rootkits to hide its presence and opens a backdoor for TOR communications.

<img src="https://example.com/image2.jpg" alt="Attack Flow Diagram" style="width:100%;height:auto;">

The malware’s attack flow involves several sophisticated techniques:

  • Rootkit Deployment: Perfctl uses rootkits to hook various system functions, modifying their behavior to conceal its activities.
  • Persistence Mechanisms: It modifies scripts like ~/.profile to ensure they run during user login and maintain their presence on the server.
  • Defense Evasion: The malware suspends its activity when a new user logs in, resuming only when the server is idle.

Exploiting Vulnerabilities: The Polkit Case

One of perfctl’s key strategies is exploiting known vulnerabilities like CVE-2021-4043 in Polkit to escalate privileges on the infected server.

This allows the malware to access root, significantly increasing its potential impact. In many cases, perfctl has been used to run cryptominers, draining system resources and causing performance issues.

The entire attack flow
The entire attack flow

Impact on Linux Servers: Cryptomining and Proxy-Jacking

The primary impact of perfctl is resource hijacking through cryptomining activities. The malware deploys a Monero cryptominer (XMRIG), which consumes significant CPU resources, leading to system slowdowns.

Additionally, some attacks have involved proxy-jacking software, further exploiting the compromised servers for financial gain.

<img src="https://example.com/image4.jpg" alt="Cryptomining Traffic" style="width:100%;height:auto;">
Compromised website serves as download server
Compromised website serves as download server

Detection and Mitigation Strategies

Detecting perfctl requires vigilance and robust monitoring systems. Key indicators include unusual spikes in CPU usage and unexpected network traffic patterns.

Administrators should inspect directories like /tmp, /usr, and /root for suspicious binaries masquerading as system files.

Monitoring network traffic for TOR-based communications can help identify potential infections. Perfctl often communicates with external IPs associated with cryptomining pools or proxy-jacking services.

Regularly check system utilities like ldd, top, lsof, and crontab for unauthorized modifications. These utilities may be replaced with trojanized versions by the malware.

As perfctl evolves, staying informed about its tactics and applying proactive security measures are crucial for protecting Linux servers.

To mitigate this threat, it is essential to regularly patch vulnerabilities, restrict file execution in writable directories, and deploy advanced anti-malware solutions.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber...

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control

A critical security flaw has been discovered in Cisco IOS XE Wireless LAN Controllers...

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber...

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control

A critical security flaw has been discovered in Cisco IOS XE Wireless LAN Controllers...

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...