A new and entirely undetected Linux threat dubbed Orbit, signally a growing trend of malware attacks towards operating system.
The malware gets its name from one of the filenames that’s utilized to temporarily store the output of executed commands (“/tmp/.orbit”), according to cybersecurity firm Intezer. OrBit is the fourth Linux malware to have come to light in a short span of three months after BPFDoor, Symbiote, and Syslogk.
The malware also functions a lot like Symbiote in that it’s designed to infect all of the running processes on the compromised machines. The malware uses two methods to achieve persistence ,Fishbein explained.
The first way is by adding the shared object to the configuration file that is used by the loader
The second way is by patching the binary of the loader itself so it will load the malicious shared object
This malware uses XOR encrypted strings and steals passwords similar to other Linux backdoors reported by ESET. Finally, this malware steals information from different commands and utilities and stores them in specific files on the machine.
Moreover, OrBit relies on a barrage of methods that enables it to purpose with out alerting its presence and establish persistence in a method. Linux threats continue to evolve.