Aman Mishra
2025-02-05 03:13:00
gbhackers.com
A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, targeting Linux systems through an advanced Secure Shell (SSH) backdoor known as ELF/Sshdinjector.A!tr.
This malware, part of a broader attack framework, compromises Linux-based network appliances and Internet-of-Things (IoT) devices, enabling data exfiltration and prolonged persistence within compromised environments.
Discovered in mid-November 2024, the backdoor was utilized during the Lunar Peek campaign, a coordinated series of attacks on network appliances.
Analysis by FortiGuard Labs reveals that the attack deploys a combination of malicious components, including a dropper, a malicious SSH library (libsshd.so), and other files designed to maintain infection and avoid detection.
Infection Mechanics
The malware initiates with a dropper binary, which verifies the host’s root privileges before infection.
If the target is deemed vulnerable, the dropper overwrites key system binaries such as ls
, netstat
, and crond
with malicious versions.
It also infects the SSH daemon using the libsshd.so file, which serves as the primary payload.
The core backdoor functionality resides in libsshd.so, enabling communication with a remote command-and-control (C2) server at a hard-coded IP address.
It executes a range of malicious activities, including:
- Exfiltration of system data such as MAC addresses and configuration details.
- Listing and reading sensitive system files, including
/etc/shadow
. - File manipulation and the ability to execute commands on the compromised system.
- Persistence through automated restarting of SSH and Cron daemons.
According to the FortiNet report, the malware operates using a custom protocol for encrypted communication with the C2 server and employs unique identifiers for tracking compromised hosts.
Technical Analysis
Through advanced reverse engineering, supported by AI tools like r2ai, researchers pieced together the intricate behavior of ELF/Sshdinjector.A!tr.
![SSH Backdoor](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl8hjpY1G83iE5stt7Uh6RjsxeeY32OvUH9v0sMArgZoN_Y2zHm_QzQOcwoGJqbU4_3YgOwiKkcZT6zDO943s8IpXxf-hz3rqxsQlu5nFru1HPxDPqSsWQjOdVQZD_G0tmDczNmzlv6br4oKaN7LEskRif7Mfa4M24Ot5S55EnSQUbd3HbfWYVlkvN1Nk/s16000/Overview%20of%20ELF:Sshdinjector.webp)
![SSH Backdoor](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl8hjpY1G83iE5stt7Uh6RjsxeeY32OvUH9v0sMArgZoN_Y2zHm_QzQOcwoGJqbU4_3YgOwiKkcZT6zDO943s8IpXxf-hz3rqxsQlu5nFru1HPxDPqSsWQjOdVQZD_G0tmDczNmzlv6br4oKaN7LEskRif7Mfa4M24Ot5S55EnSQUbd3HbfWYVlkvN1Nk/s16000/Overview%20of%20ELF:Sshdinjector.webp)
The use of AI facilitated rapid disassembly and source-code generation, although challenges such as hallucinated functionalities and omitted details required human oversight.
The collaboration between human analysts and AI allowed for in-depth decoding of the malware’s functionality, highlighting the potential but imperfect nature of AI in threat analysis workflows.
DaggerFly’s use of ELF/Sshdinjector.A!tr underscores the growing sophistication of attacks targeting Linux platforms, particularly IoT and network appliances, which often lack robust security measures.
The campaign’s ability to exfiltrate data and maintain stealth illustrates the critical need for enhanced security protocols for Linux-based systems.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.