By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
Computing

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

News Room
Last updated: 2025/02/26 at 7:46 AM
News Room Published 26 February 2025
Share
SHARE

Feb 26, 2025Ravie LakshmananLinux / Endpoint Security

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from Palo Alto Networks Unit 42.

“Once installed, Auto-color allows threat actors full remote access to compromised machines, making it very difficult to remove without specialized software,” security researcher Alex Armstrong said in a technical write-up of the malware.

Cybersecurity

Auto-color is so named based on the file name the initial payload renames itself post installation. It’s currently not known how it reaches its targets, but what’s known is that it requires the victim to explicitly run it on their Linux machine.

A notable aspect of the malware is the arsenal of tricks it employs to evade detection. This includes using seemingly-innocuous file names like door or egg, concealing command-and-control (C2) connections, and leveraging proprietary encryption algorithms for masking communication and configuration information.

Once launched with root privileges, it proceeds to install a malicious library implant named “libcext.so.2,” copies and renames itself to /var/log/cross/auto-color, and makes modifications to “/etc/ld.preload” for establishing persistence on the host.

“If the current user lacks root privileges, the malware will not proceed with the installation of the evasive library implant on the system,” Armstrong said. “It will proceed to do as much as possible in its later phases without this library.”

The library implant is equipped to passively hook functions used in libc to intercept the open() system call, which it uses to hide C2 communications by modifying “/proc/net/tcp,” a file that contains information on all active network connections. A similar technique was adopted by another Linux malware called Symbiote.

Cybersecurity

It also prevents uninstallation of the malware by protecting the “/etc/ld.preload” against further modification or removal.

Auto-color then proceeds to contact a C2 server, granting the operator the ability to spawn a reverse shell, gather system information, create or modify files, run programs, use the machine as a proxy for communication between a remote IP address and a specific target IP address, and even uninstall itself by means of a kill switch.

“Upon execution, the malware attempts to receive remote instructions from a command server that can create reverse shell backdoors on the victim’s system,” Armstrong said. “The threat actors separately compile and encrypt each command server IP using a proprietary algorithm.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Best Toaster Ovens to Roast, Toast, Bake, and Broil
Next Article Doge Uprising Sets Standard With NFTs, Gaming Expansion, and a Low-Entry Price
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

PowerVR Rogue BXS-4-64 GPU Firmware Uploaded To linux-firmware.git
Computing
The best laptops under $500: All the budget-friendly options you should consider
News
BMW launches China-focused 5 Series with 31-inch screen, automatic lane-change · TechNode
Computing
iPhone users might finally get a taste of Android’s assistant freedom
News

You Might also Like

Computing

PowerVR Rogue BXS-4-64 GPU Firmware Uploaded To linux-firmware.git

1 Min Read
Computing

BMW launches China-focused 5 Series with 31-inch screen, automatic lane-change · TechNode

1 Min Read
Computing

What Are AI Overviews & How to Optimize For Them

12 Min Read
Computing

Shein’s valuation drops to $45 billion amid investigations and stalling IPO: report · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?