Tuesday, April 22, 2025
Homecyber securityNew Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit

New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit

Published on

SIEM as a Service

Follow Us on Google News

Researchers at QiAnXin XLab have uncovered a sophisticated Linux-based backdoor dubbed OrpaCrab, specifically targeting industrial systems associated with ORPAK, a company involved in gas stations and oil transportation.

The malware, which was uploaded to VirusTotal in January 2024 from the U.S., employs advanced techniques to evade detection and maintain persistence on compromised systems.

Exploitation of MQTT Protocol for Covert C2 Communication

One of OrpaCrab’s notable features is its utilization of the MQTT (Message Queuing Telemetry Transport) protocol for command and control (C2) communication.

- Advertisement - Google News

This approach allows the malware to blend its traffic with legitimate MQTT communications, making it challenging for security teams to detect malicious activity.

The backdoor establishes persistence through a script that autostart from “/etc/rc3.d/” and employs AES-256-CBC encryption to obfuscate its configuration information.

Furthermore, OrpaCrab leverages DNS over HTTPS (DoH) to resolve its C2 domain, effectively bypassing traditional DNS monitoring techniques.

Potential Link to CyberAv3ngers Hacking Group

Claroty researchers, who independently analyzed the malware and codenamed it IOCONTROL, reported that it was extracted from a Gasboy fuel management system previously compromised by the CyberAv3ngers hacking group.

This group has been linked to cyberattacks exploiting Unitronics PLCs to breach water systems, suggesting a potential expansion of their targeting to include fuel infrastructure.

The malware’s presence within Gasboy’s Payment Terminal (OrPT) implies that the threat actors had the capability to control payment systems, potentially enabling them to disrupt fuel services and steal customer credit card information.

The discovery of OrpaCrab highlights the evolving threat landscape for operational technology (OT) systems, particularly in critical infrastructure sectors.

The malware’s sophisticated design, including its use of MQTT for C2 communications and its ability to target specific industrial systems, demonstrates the increasing complexity of attacks against OT environments.

This incident serves as a stark reminder for organizations in the energy and transportation sectors to enhance their cybersecurity measures, particularly focusing on securing communication protocols and implementing robust monitoring systems capable of detecting anomalous behavior in industrial control systems.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...