Stealthy 'sedexp' #Linux #malware evaded #detection for two years

source: https://www.bleepingcomputer.com/news/security/stealthy-sedexp-linux-malware-evaded-detection-for-two-years/

Regarding its operational capabilities, the malware uses either forkpty or pipes and a forked new process to set up a reverse shell for the attacker to remotely access the infected device.

#Sedexp also employs memory #manipulation techniques to hide any file containing the string "sedexp" from standard commands like 'ls' or 'find,' concealing its presence on the system.

#software #news #security #cybersecurity #research #problem #cybercrime

1
12