Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

New ‘Auto-Color’ Linux Malware Targets North America, Asia

New Linux malware named Auto-Color, which allows full remote access to compromised devices, targets North America and Asia.

Auto-Color Linux Malware

Palo Alto Networks has shared details on a new piece of Linux malware that gives threat actors backdoor access to compromised devices. 

Named Auto-Color (based on the name of the initial payload), the Linux malware was first spotted by the security firm in early November 2024. Palo Alto obtained the most recent sample on December 5, 2024. 

The company’s analysis showed that Auto-Color has mainly been used to target universities and governments in North America and Asia. 

Palo Alto has not been able to determine how the malware reaches targets, but pointed out that it needs to be explicitly executed by the victim on a Linux computer.

Once it has been fully deployed on a system, it provides its operator with complete remote access to the targeted machine, and it’s “very difficult to remove without specialized software”, the security firm said.

The malware supports commands that enable the attacker to collect host information, uninstall the malware, create a reverse shell, create and modify files, execute a program, and turn the device into a proxy.

Auto-Color uses various methods to evade detection, including using harmless-looking file names, hiding C&C connections using a sophisticated technique, and leveraging proprietary encryption algorithms to protect information pertaining to communication and configuration.

Palo Alto has shared indicators of compromise (IoCs) to help defenders detect the Auto-Color Linux malware on their networks.

Advertisement. Scroll to continue reading.

Related: Golang Backdoor Abuses Telegram for C&C Communication

Related: Chinese Botnet Powered by 130,000 Devices Targets Microsoft 365 Accounts

Related: Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines

Related: New FrigidStealer macOS Malware Distributed as Fake Browser Update

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.