Malware News FakeFile Trojan Opens Backdoors on Linux, Except openSUSE

BoraMurdar

Super Moderator
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed in live attacks.

Russian antivirus vendor Dr.Web discovered this new trojan in October. The company's malware analysts say the trojan is spread in the form of an archived PDF, Microsoft Office, or OpenOffice file.

Trojan doesn't target openSUSE distros
The infection starts when users open the file. The trojan springs into action by copying itself to "< HOME >/.gconf/apps/gnome-common/gnome-common" and then opens a decoy document, hence his name of "FakeFile."

The trojan also adds a shortcut to itself in the user's .profile and .bash_profile files, which allows it to gain boot persistence between PC reboots.

Curiously, the trojan has a specific rule in its source code which prevents the infection routine from executing if the Linux distro is openSUSE. A reason for this might by that the malware author uses an openSUSE distro, but this is just speculation, since this theory is impossible to verify.

FakeFile is a fully-fledged backdoor trojan
Once all these first-run operations are out of the way, the real "fun" begins, with FakeFile contacting its command and control server and requesting further instructions.

According to clues found in the trojan's source, the trojan can perform a series of actions, such as rename or delete files, send a file or a folder's entire content to the C&C server, send a list of files found in a folder to the C&C server, or create new files and folders.

Additionally, the trojan can also run files, run shell commands, get or set permissions for desired files and folders, terminate its process, or remove itself from an infected host.

FakeFile doesn't need root access
The most worrisome part is that FakeFile doesn't need root access for all these operations, and can work just fine with the current user's permissions.

The number of trojans targeting the Linux platform has grown tremendously in the past year, but in most cases, these targeted Linux servers or IoT devices running Linux-derived operating systems.

Security firms rarely encounter trojans targeting Linux desktop environments. At the time of writing, Dr.Web didn't specify how the trojan spreads, but spam is the number one suspect, since malware authors often use spam and office-related files to spread backdoor trojans on Windows and Mac.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top