this post was submitted on 16 Jun 2024
81 points (98.8% liked)

Cybersecurity

5476 readers
47 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 1 year ago
MODERATORS
 

A newly discovered Linux malware dubbed 'DISGOMOJI' uses the novel approach of utilizing emojis to execute commands on infected devices in attacks on government agencies in India.

all 14 comments
sorted by: hot top controversial new old
[–] [email protected] 44 points 3 months ago (2 children)

So to get infected, you need to download and unpack a ZIP archive sent to you from an unknown address, then execute the file it contains? In that case, I'm not too worried.

[–] [email protected] 22 points 3 months ago

It's more about C&C, novel ways to get around firewall restrictions. Deploying a payload is the hard part, but having control over a large botnet without raising red flags is an art as well.

[–] [email protected] 12 points 3 months ago (1 children)
[–] [email protected] 1 points 3 months ago (2 children)

Especially Linux malware. It's not a huge target, so it's likely to be low effort stuff like this instead of zero-days attacking some linux-specific API. That level of attack is reserved for higher value targets, like servers and windows.

[–] [email protected] 5 points 3 months ago (1 children)

It’s not a huge target

I never understood that claim. Most of the internet, most servers and most machine controllers, as well as most cloud services (including Microsoft Azure) run on Linux.
It's the biggest target in the world.

[–] [email protected] 5 points 3 months ago

Linux servers are, and I specifically called that out. The types of attacks you use against a server are very different than attacks against a desktop. Most desktops don't run web servers, and most servers don't run discord or web browsers.

So linux desktops should see a lot fewer attacks than servers because the value of successfully attacking them is much lower. As that changes, so will the amount of malware targeting linux desktops.

[–] [email protected] 1 points 3 months ago (1 children)

Linux servers are the biggest target though.

[–] [email protected] 1 points 3 months ago* (last edited 3 months ago)

Exactly, because they're high value targets, as I mentioned. But they're going to use more exotic exploits than an attack on linux desktops, because the expected return vs work to get the exploit makes more sense. Grandma isn't likely using linux to access her bank account, but she is likely accessing a linux server.

[–] [email protected] 30 points 3 months ago

OP didn't bother to write it, so I will. The infection vector is an executable distributed through mail, targeting computers of the Indian government.

According to Volexity, the malware was discovered after the researchers spotted a UPX-packed ELF executable in a ZIP archive, likely distributed through phishing emails. Volexity believes that the malware targets a custom Linux distribution named BOSS that Indian government agencies use as their desktop.

When executed, the malware will download and display a PDF lure that is a beneficiary form from India's Defence Service Officer Provident Fund in case of an officer's death.

However, additional payloads will be downloaded in the background, including the DISGOMOJI malware and a shell script named 'uevent_seqnum.sh' that is used to search for USB drives and steal data from them.

When DISGOMOJI is launched, the malware will exfiltrate system information from the machine, including IP address, username, hostname, operating system, and the current working directory, which is sent back to the attackers.

To control the malware, the threat actors utilize the open-source command and control project discord-c2, which uses Discord and emojis to communicate with infected devices and execute commands.

The malware will connect to an attacker-controlled Discord server and wait for the threat actors to type emojis into the channel.

[–] [email protected] 7 points 3 months ago

Pretty clever to disguise the commands and replays as emojis. I bet it's going to open yet another cat-and-mouse-game for pattern matching.

[–] [email protected] 1 points 3 months ago (1 children)

What happens if the victim dosen't have discord installed on the PC? The virus have no way to get orders?

[–] [email protected] 7 points 3 months ago

Didn't sound like it uses the discord client but rather the malware connects directly to a server