Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data

Posted on August 14, 2025August 15, 2025 By CWS

A complicated new variant of the FireWood backdoor has emerged, concentrating on Linux programs with enhanced evasion capabilities and streamlined command execution performance.

This newest iteration represents a big evolution of the malware household first found by ESET’s analysis group, which has been linked to the long-running “Challenge Wooden” malware lineage relationship again to no less than 2005.

The FireWood backdoor operates as a distant entry trojan (RAT) particularly designed for Linux environments, using kernel-level rootkit modules and TEA-based encryption to take care of stealth and set up persistent command-and-control communications.

As soon as deployed, sometimes by means of net shells planted on compromised Linux desktops, the malware allows attackers to execute arbitrary instructions, harvest delicate system data and credentials, and conduct extended espionage operations whereas remaining largely undetected.

Intezer researchers recognized this new variant with the SHA256 hash 898a5bd86c5d99eb70088a90f1d8f90b03bd38c15a232200538d0601c888acb6, noting vital architectural modifications from earlier variations.

The malware maintains low confidence connections to the China-aligned Gelsemium APT group, although these overlaps might mirror shared toolsets throughout a number of risk actors moderately than definitive attribution.

The up to date variant demonstrates notable modifications in its initialization and networking protocols.

Not like earlier variations that applied express permission gates by means of CUser::IsSuc() calls, the brand new iteration removes this early verify solely, as a substitute deferring root-or-kernel validation till after daemonization and PID storage.

This architectural shift splits the previous SavePidAndCheckKernel() perform into discrete elements: an preliminary SavePid(pid) operation adopted by CModuleControl::AutoLoad() and CheckLkmLoad() capabilities.

Enhanced Communication Protocol and System Reconnaissance

The malware’s networking implementation represents a big departure from its predecessor’s advanced timing mechanisms.

New evasion implementation and comparability of primary capabilities (Supply – Intezer)

Whereas older variants employed subtle randomized time-window algorithms with configurable beacon intervals and delay parameters, the brand new model adopts a simplified method utilizing a steady whereas (true) loop construction.

After the configured startup delay, the malware persistently makes an attempt C2 connections by means of ConnectToSvr() calls, implementing transient sleep intervals upon failure till profitable connection institution or timer expiration.

For system reconnaissance, the up to date variant enhances OS detection capabilities by implementing a fallback mechanism.

When the first /and many others/challenge file proves unavailable, the malware routinely makes an attempt to learn distribution data from /and many others/challenge.web, sustaining constant parsing methodologies throughout each sources.

This redundancy ensures dependable system fingerprinting no matter goal configuration variations.

Enhance your SOC and assist your group defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacking, Commands, Data, Execute, Exfiltrate, FireWood, Linux, Malware, Sensitive, Systems

Post navigation

Previous Post: New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
Next Post: Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July

Related Posts

ChatGPT Agent Bypasses Cloudflare “I am not a robot” Verification Checks Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed Cyber Security News
Secret Blizzard Group’s ApolloShadow Malware Install Root Certificates on Devices to Trust Malicious Sites Cyber Security News
Microsoft Defender for Endpoint Bug Triggers Numerous False BIOS Alerts Cyber Security News
Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News