Telegram-controlled backdoor trojan targets Linux servers

July 4, 2024

Physician Internet virus analysts uncovered a Linux model of the well-known TgRat trojan, which is used for focused assaults on computer systems. One notable function of this trojan is that it’s managed by way of a Telegram bot.

This malware belongs to the Distant Entry Trojan sort, higher identified by its slightly disagreeable however very apt acronym — RAT. Primarily, RATs are the identical distant entry and administration instruments we’ve all change into accustomed to because the COVID lockdowns, solely this time they’re enjoying for the dangerous guys. The principle distinction is that the focused person mustn’t suspect that another person is controlling their machine.

The TgRat trojan was initially found in 2022. It was a small trojan written for Home windows and designed to exfiltrate information from a compromised machine. Not way back virus analysts at Physician Internet found its Linux model.

Our virus lab acquired a ticket from a internet hosting supplier to analyze an data safety incident involving what turned out to be the Linux model of the TgRat trojan. Dr.Internet antivirus detected a suspicious file on the server of one of many purchasers. The file in query was a trojan dropper, i.e., a program designed to ship malware to an attacked pc. This dropper unpacked the Linux.BackDoor.TgRat.2 trojan into the system.

The trojan is designed to focus on particular computer systems: when it begins, it checks the hash of the pc title in opposition to an embedded string. If the values don’t match, TgRat terminates its course of. In any other case, it connects to the community and implements a slightly uncommon technique for interacting with its management server, which occurs to be a Telegram bot.

Telegram is extensively used as a company messenger in lots of corporations. Subsequently, it isn’t shocking that risk actors can use it as a vector to ship malware and steal confidential data: the recognition of this system and the routine site visitors to Telegram’s servers make it straightforward to disguise malware on a compromised community.

The trojan is managed by way of a non-public Telegram group to which the bot is linked. Utilizing the messenger, attackers can problem instructions to the trojan. It will possibly obtain recordsdata from a compromised system, take a screenshot, remotely execute a command, or add a file as an attachment.

Not like its Home windows counterpart, this trojan was encrypted with RSA and used the bash interpreter to execute instructions, permitting complete scripts to be executed inside a single message. Every occasion of the trojan had a novel identifier, permitting attackers to ship instructions to a number of bots, connecting all of them to a single chat room.

This assault, though uncommon within the selection of interplay between the trojan and the management server, will be detected by rigorously analysing community site visitors: exchanging information with Telegram’s servers could also be typical for person machines, however not for a neighborhood community server.

To forestall an infection, we advocate putting in anti-virus software program on all native community nodes. Dr.Internet Safety Suite anti-virus options for Home windows, macOS, Android, Linux and FreeBSD servers and workstations reliably defend our company purchasers. Moreover, for edge gadgets on the community perimeter, Physician Internet affords a answer based mostly on Stream Engine scanning expertise, which permits site visitors information to be scanned for threats with nearly no delay.

Indicators of compromise

Leave a Reply

Your email address will not be published. Required fields are marked *