Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector

Cybersecurity researchers have taken the wraps off what they call a “nearly-impossible-to-detect” Linux malware that could be weaponized to backdoor infected systems.

Dubbed Symbiote by threat intelligence firms BlackBerry and Intezer, the stealthy malware is so named for its ability to conceal itself within running processes and network traffic and drain a victim’s resources like a parasite.

The operators behind Symbiote are believed to have commenced development on the malware in November 2021, with the threat actor predominantly using it to target the financial sector in Latin America, including banks like Banco do Brasil and Caixa.

“Symbiote’s main objective is to capture credentials and to facilitate backdoor access to a victim’s machine,” researchers Joakim Kennedy and Ismael Valenzuela said in a report shared with The Hacker News. “What makes Symbiote different from other Linux malware is that it infects running processes rather than using a standalone executable file to inflict damage.”

It achieves this by leveraging a native Linux feature called LD_PRELOAD — a method previously employed by malware such as Pro-Ocean and Facefish — so as to be loaded by the dynamic linker into all running processes and infect the host.

Besides hiding its presence on the file system, Symbiote is also capable of cloaking its network traffic by making use of the extended Berkeley Packet Filter (eBPF) feature. This is carried out by injecting itself into an inspection software’s process and using BPF to filter out results that would uncover its activity.

Upon hijacking all running processes, Symbiote enables rootkit functionality to further hide evidence of its existence and provides a backdoor for the threat actor to log in to the machine and execute privileged commands. It has also been observed storing captured credentials encrypted in files masquerading as C header files.

This is not the first time a malware with similar capabilities has been spotted in the wild. In February 2014, ESET revealed a Linux backdoor called Ebury that’s built to steal OpenSSH credentials and maintain access to a compromised server.

Furthermore, the disclosure arrives nearly a month after details emerged about an evasive Linux-based passive implant called BPFDoor that loads a Berkeley Packet Filter (BPF) sniffer to monitor network traffic and initiate a bind shell while bypassing firewall protections.

“Since the malware operates as a user-land level rootkit, detecting an infection may be difficult,” the researchers concluded. “Network telemetry can be used to detect anomalous DNS requests and security tools such as AVs and EDRs should be statically linked to ensure they are not ‘infected’ by userland rootkits.”

You May Also Like

2 thoughts on “Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector

  1. Thanks for sharing your ideas here. The other thing is that when a problem occurs with a personal computer motherboard, folks should not take the risk involving repairing the item themselves because if it is not done correctly it can lead to permanent damage to all the laptop. It is usually safe just to approach a dealer of your laptop for that repair of the motherboard. They have got technicians with an experience in dealing with notebook motherboard troubles and can have the right prognosis and conduct repairs.

Leave a Reply

Your email address will not be published. Required fields are marked *


Unique Visitors
» 16,469 Today
» 29,544 Yesterday
» 192,943 This Week
» 876,717 This Month
» 3,570,004 This Year
» 19,805,099 Total (since 2019-12-11)
» Record: 205,757 (2023-08-13)
Counter by DarkWeb.Solutions