Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

New ‘Shikitega’ Linux Malware Grabs Complete Control of Infected Systems

Security researchers with AT&T Alien Labs are warning of a new piece of malware that can take full control of infected Linux systems, including Internet of Things (IoT) devices.

Security researchers with AT&T Alien Labs are warning of a new piece of malware that can take full control of infected Linux systems, including Internet of Things (IoT) devices.

Dubbed Shikitega, the threat is delivered as part of a multi-stage infection chain, where each step is responsible for a part of the payload and fetches and executes the next module.

To ensure it can gain full control over an infected system, the malware downloads and executes Metasploit’s ‘Mettle’ meterpreter. It also attempts to exploit system vulnerabilities to escalate privileges and achieve persistence.

Shikitega hosts some of its command and control (C&C) servers on legitimate cloud services, uses a polymorphic encoder to evade detection, and deploys a cryptocurrency miner on the infected machines.

With the help of Mettle, the attackers can execute attacks such as webcam controls, sniffers, various reverse shells, shell commands, process controls, and more.

AT&T Alien Labs also observed the malware using wget to fetch and run a next stage dropper. Shell commands are used to download and execute additional payloads.

Shikitega, the security researchers say, exploits two known Linux vulnerabilities – CVE-2021-4034 and CVE-2021-3493 – to fetch and execute the final payload – a persistent cryptocurrency miner – with root privileges.

The researchers says the malware is using five shell scripts to achieve persistence. The threat sets crontabs for the current user and for the user root – the malware first checks for the presence of crontab command on the machine and creates it if it does not exist.

The malware deploys XMRig (a popular miner for Monero) as its final payload and sets a persistence crontab for downloading and executing the miner.

To mitigate the risk of infection, AT&T Alien Labs recommends the fundamental protections of installing security patches in a timely manner, keeping server backups, and using anti-malware software on all endpoints.

Related: Intezer Documents Powerful ‘Lightning Framework’ Linux Malware

Related: CISA Says ‘PwnKit’ Linux Vulnerability Exploited in Attacks

Related: Avast: New Linux Rootkit and Backdoor Align Perfectly

Related: Highly-Evasive Linux Malware ‘Symbiote’ Infects All Running Processes

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads.


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.