One Article Review

Accueil - L'article:
Source CSO.webp CSO
Identifiant 4664338
Date de publication 2022-05-11 06:59:00 (vue: 2022-05-17 11:05:09)
Titre Stealthy Linux implant BPFdoor compromised organizations globally for years
Texte Malware researchers warn about a stealthy backdoor program that has been used by a Chinese threat actor to compromise Linux servers at government and private organizations around the world. While the backdoor is not new and variants have been in use for the past five years, it has managed to fly under the radar and have very low detection rates. One reason for its success is that it leverages a feature called the Berkeley Packet Filter (BPF) on Unix-based systems to hide malicious traffic.BPFdoor was named by researchers from PwC Threat Intelligence who attribute it to a Chinese group they call Red Menshen. The PwC team found the threat while investigating several intrusions throughout Asia last year and included a short section about it in their annual threat report released late last monthTo read this article in full, please click here
Envoyé Oui
Condensat about actor annual around article asia attribute backdoor based been berkeley bpf bpfdoor call called chinese click compromise compromised detection feature filter five fly found from full globally government group has have here hide implant included intelligence intrusions investigating its last late leverages linux low malicious malware managed menshen monthto named new not one organizations packet past please private program pwc radar rates read reason red released report researchers section servers several short stealthy success systems team threat throughout traffic under unix use used variants very warn who world year years
Tags Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: