RotaJakiro Linux backdoor has flown under the radar since 2018 | xxxRotaJakiro Linux backdoor has flown under the radar since 2018 – xxx
菜单

RotaJakiro Linux backdoor has flown under the radar since 2018

四月 28, 2021 - SecurityAffairs

Experts recently uncovered a Linux backdoor, dubbed RotaJakiro, that has flown under the radar for many years while harvest and exfiltrate sensitive information from the victims. 

RotaJakiro is a Linux backdoor recently discovered by researchers at Qihoo 360’s Network Security Research Lab (360 Netlab). The malware remained undetected for years while threat actors were employing it in attacks to harvest and exfiltrate sensitive information from infected devices. The name RotaJakiro comes from the fact that the family uses rotate encryption and behaves differently for root/non-root accounts when executing.

The malware uses multiple of encryption algorithms, including AES algorithm to encrypt the resource information within the sample, and a combination of AES, XOR, ROTATE encryption and ZLIB compression for C2 communication.

RotaJakiro has a modular structure that is based on the use of plugins, it supports 12 functions grouped into the following categories

  • Reporting device information
  • Stealing sensitive information
  • File/Plugin management (query, download, delete)
  • Execution of specific Plugin

At the time of this writing, 360 Netlab experts have yet to discover a plugin and it is unclear their purposes.

“At the coding level, RotaJakiro uses techniques such as dynamic AES, double-layer encrypted communication protocols to counteract the binary & network traffic analysis.” reads the analysis published by the experts. “At the functional level, RotaJakiro first determines whether the user is root or non-root at run time, with different execution policies for different accounts, then decrypts the relevant sensitive resources using AES& ROTATE for subsequent persistence, process guarding and single instance use, and finally establishes communication with C2 and waits for the execution of commands issued by C2.”

The RotaJakiro backdoor was first spotted in 2018 when a sample was uploaded on VirusTotal’s anti-malware service.

Since 2018, the researchers spotted four distinct samples of the malware that were uploaded between May 2018 and January 2021. The experts pointed out that all the samples they discovered have a zero detection.

The Command-and-control servers used by threat actors behind the Linux botnet have domains registered in December 2015. Below the list of samples analyzed by the experts over the years:

FILENAMEMD5DETECTIONFIRST SEEN IN VT
systemd-daemon1d45cd2c1283f927940c099b8fab593b0/612018-05-16 04:22:59
systemd-daemon11ad1e9b74b144d564825d65d7fb37d60/582018-12-25 08:02:05
systemd-daemon5c0f375e92f551e8f2321b141c15c48f0/562020-05-08 05:50:06
gvfsd-helper64f6cfe44ba08b0babdd3904233c48570/612021-01-18 13:13:19

The investigation of the 360 Netlab also revealed a link between the backdoor and the Torii IoT botnet that was uncovered by Avast experts in September 2018.

The two malicious codes support the same commands, other similarities include the use of encryption algorithms to hide sensitive resources, the implementation of a rather old-school style of persistence, structured network traffic.

The investigation is still ongoing, experts are requesting support to cybersecurity community to gather more information about this threat.

“While this concludes our analysis of RotaJakiro, the real work is far from over, and many questions remain unanswered: “How did RotaJakiro spread, and what was its purpose?” , “Does RotaJakiro have a specific target?”, We would love to know if the community has relevant leads.” concludes the report.

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, connected TV)


Share On

RotaJakiro Linux backdoor has flown under the radar since 2018
Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at “Cyber Defense Magazine”, Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog “Security Affairs” recently named a Top National Security Resource for US. Pierluigi is a member of the “The Hacker News” team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books “The Deep Dark Web” and “Digital Virtual Currency and Bitcoin”.

Experts recently uncovered a Linux backdoor, dubbed RotaJakiro, that has flown under the radar for many years while harvest and exfiltrate sensitive information from the victims. 

RotaJakiro is a Linux backdoor recently discovered by researchers at Qihoo 360’s Network Security Research Lab (360 Netlab). The malware remained undetected for years while threat actors were employing it in attacks to harvest and exfiltrate sensitive information from infected devices. The name RotaJakiro comes from the fact that the family uses rotate encryption and behaves differently for root/non-root accounts when executing.

The malware uses multiple of encryption algorithms, including AES algorithm to encrypt the resource information within the sample, and a combination of AES, XOR, ROTATE encryption and ZLIB compression for C2 communication.

RotaJakiro has a modular structure that is based on the use of plugins, it supports 12 functions grouped into the following categories

At the time of this writing, 360 Netlab experts have yet to discover a plugin and it is unclear their purposes.

“At the coding level, RotaJakiro uses techniques such as dynamic AES, double-layer encrypted communication protocols to counteract the binary & network traffic analysis.” reads the analysis published by the experts. “At the functional level, RotaJakiro first determines whether the user is root or non-root at run time, with different execution policies for different accounts, then decrypts the relevant sensitive resources using AES& ROTATE for subsequent persistence, process guarding and single instance use, and finally establishes communication with C2 and waits for the execution of commands issued by C2.”

The RotaJakiro backdoor was first spotted in 2018 when a sample was uploaded on VirusTotal’s anti-malware service.

Since 2018, the researchers spotted four distinct samples of the malware that were uploaded between May 2018 and January 2021. The experts pointed out that all the samples they discovered have a zero detection.

The Command-and-control servers used by threat actors behind the Linux botnet have domains registered in December 2015. Below the list of samples analyzed by the experts over the years:

FILENAMEMD5DETECTIONFIRST SEEN IN VT
systemd-daemon1d45cd2c1283f927940c099b8fab593b0/612018-05-16 04:22:59
systemd-daemon11ad1e9b74b144d564825d65d7fb37d60/582018-12-25 08:02:05
systemd-daemon5c0f375e92f551e8f2321b141c15c48f0/562020-05-08 05:50:06
gvfsd-helper64f6cfe44ba08b0babdd3904233c48570/612021-01-18 13:13:19

The investigation of the 360 Netlab also revealed a link between the backdoor and the Torii IoT botnet that was uncovered by Avast experts in September 2018.

The two malicious codes support the same commands, other similarities include the use of encryption algorithms to hide sensitive resources, the implementation of a rather old-school style of persistence, structured network traffic.

The investigation is still ongoing, experts are requesting support to cybersecurity community to gather more information about this threat.

“While this concludes our analysis of RotaJakiro, the real work is far from over, and many questions remain unanswered: “How did RotaJakiro spread, and what was its purpose?” , “Does RotaJakiro have a specific target?”, We would love to know if the community has relevant leads.” concludes the report.

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, connected TV)

Share this…
RotaJakiro Linux backdoor has flown under the radar since 2018

Facebook

RotaJakiro Linux backdoor has flown under the radar since 2018

Twitter

RotaJakiro Linux backdoor has flown under the radar since 2018

Linkedin

Share this:


Share On


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51