Stealthy 'sedexp' #Linux #malware evaded #detection for two years
Regarding its operational capabilities, the malware uses either forkpty or pipes and a forked new process to set up a reverse shell for the attacker to remotely access the infected device.
#Sedexp also employs memory #manipulation techniques to hide any file containing the string "sedexp" from standard commands like 'ls' or 'find,' concealing its presence on the system.
#software #news #security #cybersecurity #research #problem #cybercrime
2 Likes
12 Comments
1 Shares