HomeVulnerabilityRansomware actors goal patched SonicWall SMA units with rootkit

Ransomware actors goal patched SonicWall SMA units with rootkit

The OVERSTEP backdoor, written in C, is particularly designed for SonicWall SMA 100 collection home equipment. It injects itself into the reminiscence of different processes by way of the /and many others/ld.so.preload file after which hijacks customary file system features comparable to open, open64, readdir, readdir64, and write. This enables it to cover its elements on the system.

The backdoor’s primary function is to steal passwords and supply attackers with a reverse shell on the system, by way of which they’ll execute further shell instructions.

“In our investigations, GTIG noticed beaconing site visitors from compromised home equipment, however we didn’t determine notable post-compromise actions,” the researchers wrote. “The actor’s success in hiding their tracks is essentially because of OVERSTEP’s functionality to selectively delete log entries from httpd.log, http_request.log, and inotify.log. This anti-forensic measure, mixed with an absence of shell historical past on disk, considerably reduces visibility into the actor’s secondary targets.”

See also  New Hugging Face Vulnerability Exposes AI Fashions to Provide Chain Attacks
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular