Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Linux Trojan Takes Screenshots Every 30 Seconds

Russian antivirus company Doctor Web reported finding a new Linux Trojan that appears to be designed to help cybercriminals spy on users.

Russian antivirus company Doctor Web reported finding a new Linux Trojan that appears to be designed to help cybercriminals spy on users.

Detected by Dr. Web products as Linux.Ekoms.1, the malware takes screenshots every 30 seconds and saves them to a temporary folder in the JPEG format using the extension .sst. If the screenshot cannot be saved as a JPEG, Ekoms attempts to save it in the BMP image format.

An analysis of the Trojan revealed that its developers are also working on a feature designed to record audio and save the recording in WAV format in a file with the .aat extension in the same temporary folder. While the sound recording feature exists, it’s not active in the Ekoms variant analyzed by Dr. Web.

The malware is designed to periodically search its temporary folder for files with certain names and extensions. It looks for .aat and .sst files, which are supposed to store screenshots and audio recordings, and also for .ddt and .kkt files, which suggests the malware authors might be targeting other type of content as well.

The files that match the search criteria are uploaded to a remote server whose address is hardcoded in the malware. All data sent by Linux.Ekoms.1 to the server is encrypted.

Attackers can use the command and control (C&C) server to send various commands to the threat, including to download other files, and enable or disable specified services. There are some instructions that have not been implemented, which also suggests the Trojan is still under development.

Linux systems are increasingly targeted by various types of malware, and many of the threats are designed to help malicious actors launch distributed denial-of-service (DDoS) attacks.

Advertisement. Scroll to continue reading.

Linux ransomware has also started making rounds over the past period. The file-encrypting ransomware Linux.Encoder targets web servers, websites, backups and source code stored on infected machines.

Linux.Encoder infected thousands of devices, but researchers found a flaw that can be leveraged to recover encrypted files without paying the ransom. Linux.Encoder is reportedly based on Hidden Tear, an open source ransomware whose author intentionally weakened encryption to prevent abuse.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.

Cybercrime

The recent ransomware attack targeting Rackspace was conducted by a cybercrime group named Play using a new exploitation method, the cloud company revealed this...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...