Sept. 18, 2023, 11:30 a.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news

While monitoring Earth Lusca, we discovered an intriguing, encrypted file on the threat actor’s server — a Linux-based malware, which appears to originate from the open-source Windows backdoor Trochilus, which we’ve dubbed SprySOCKS due to its swift behavior and SOCKS implementation.


Article Link: Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement


1 post - 1 participant


Read full topic

actor article backdoor cobalt cobalt strike earth earth lusca encrypted file implementation lateral movement link linux malware monitoring server socks strike swift threat threat actor trochilus windows

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Lead Technical Product Manager - Threat Protection

@ Mastercard | Remote - United Kingdom

Data Privacy Officer

@ Banco Popular | San Juan, PR

GRC Security Program Manager

@ Meta | Bellevue, WA | Menlo Park, CA | Washington, DC | New York City

Cyber Security Engineer

@ ASSYSTEM | Warrington, United Kingdom

Privacy Engineer, Technical Audit

@ Meta | Menlo Park, CA