By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Computing

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

News Room
Last updated: 2025/04/15 at 11:01 AM
News Room Published 15 April 2025
Share
SHARE

Apr 15, 2025Ravie LakshmananLinux / Malware

The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a variant of a known malware dubbed SNOWLIGHT and a new open-source tool called VShell to infect Linux systems.

“Threat actors are increasingly using open source tools in their arsenals for cost-effectiveness and obfuscation to save money and, in this case, plausibly blend in with the pool of non-state-sponsored and often less technical adversaries (e.g., script kiddies), thereby making attribution even more difficult,” Sysdig researcher Alessandra Rizzo said in a report shared with The Hacker News.

“This seems to hold especially true for this particular threat actor, who has been under the radar for the last year since being affiliated with the Chinese government.”

UNC5174, also referred to as Uteus (or Uetus), was previously documented by Google-owned Mandiant as exploiting security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver a C-based ELF downloader named SNOWLIGHT, which is designed to fetch a Golang tunneler dubbed GOHEAVY from infrastructure tied to a publicly available command-and-control (C2) framework known as SUPERSHELL.

Cybersecurity

Also deployed in the attacks was GOREVERSE, a publicly available reverse shell backdoor written in Golang that operates over Secure Shell (SSH).

The French National Agency for the Security of Information Systems (ANSSI), in its Cyber Threat Overview report for 2024 published last month, said it observed an attacker employing similar tradecraft as that of UNC5174 to weaponize security flaws in Ivanti Cloud Service Appliance (CSA) such as CVE-2024-8963, CVE-2024-9380, and CVE-2024-8190 to gain control and execute arbitrary code.

“Moderately sophisticated and discreet, this intrusion set is characterized by the use of intrusion tools largely available as open source and by the – already publicly reported – use of a rootkit code,” the ANSSI said.

It’s worth noting that both SNOWLIGHT and VShell are capable of targeting Apple macOS systems, with the latter distributed as a fake Cloudflare authenticator application as part of an as-yet-undetermined attack chain, according to an analysis of artifacts uploaded to VirusTotal from China in October 2024.

In the attack chain observed by Sysdig in late January 2025, the SNOWLIGHT malware acts as a dropper for a fileless, in-memory payload called VShell, a remote access trojan (RAT) widely used by Chinese-speaking cybercriminals. The initial access vector used for the attack is presently unknown.

Specifically, the initial access is used to execute a malicious bash script (“download_backd.sh”) that deploys two binaries associated with SNOWLIGHT (dnsloger) and Sliver (system_worker), both of which are used to set up persistence and establish communications with a C2 server.

The final stage of the attack delivers VShell via SNOWLIGHT by means of a specially crafted request to the C2 server, thereby enabling remote control and further post-compromise exploitation.

“[VShell] acts as a RAT (Remote Access Trojan), allowing its abusers to execute arbitrary commands and download or upload files,” Rizzo said. “SNOWLIGHT and VShell pose a significant risk to organizations due to their stealthy and sophisticated techniques,” Sysdig said. “This is evidenced by the employment of WebSockets for command-and-control, as well as the fileless VShell payload.”

Cybersecurity

The disclosure comes as TeamT5 revealed that a China-nexus hacking group likely exploited security flaws in Ivanti appliances (CVE-2025-0282 and CVE-2025-22457) to gain initial access and deploy the SPAWNCHIMERA malware.

The attacks, the Taiwanese cybersecurity company said, targeted a multitude of sectors spanning nearly 20 different countries such as Austria, Australia, France, Spain, Japan, South Korea, Netherlands, Singapore, Taiwan, the United Arab Emirates, the United Kingdom, and the United States.

The findings also dovetail with accusations from China that the U.S. National Security Agency (NSA) launched “advanced” cyber attacks during the Asian Winter Games in February, pointing fingers at three NSA agents for repeated attacks on China’s critical information infrastructure as well as against Huawei.

“At the ninth Asian Winter Games, the U.S. government conducted cyberattacks on the information systems of the Games and the critical information infrastructure in Heilongjiang,” Foreign Ministry Spokesperson Lin Jian said. “This move is egregious for it severely endangers the security of China’s critical information infrastructure, national defense, finance, society, and production as well as its citizens’ personal information.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Embedded agent startup Mindset AI raises £4.3m to expand to US – UKTN
Next Article It's Hard to Pick a 'Black Mirror' Season 7 Favorite. Just Don't Skip This Episode
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Sony Xperia 1 VII’s secret weapon is a content creator’s dream
Gadget
Startups, Do You Really Want to Pay The Microservices Tax? | HackerNoon
Computing
Samsung Galaxy S25 Edge preorder deals: Get a $50 Amazon gift card, 256GB free storage
News
KinHanK K18G Monitor review: specs, performance, cost
News

You Might also Like

Computing

Startups, Do You Really Want to Pay The Microservices Tax? | HackerNoon

26 Min Read
Computing

Vivo announces integration of DeepSeek into its mobile operating system · TechNode

1 Min Read
Computing

Top 10 AI KPI Generators for 2025 |

20 Min Read
Computing

Sonic Labs Announces $10M Token Sale To Galaxy For U.S. Expansion | HackerNoon

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?