Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data

Posted on August 14, 2025August 15, 2025 By CWS

A complicated new variant of the FireWood backdoor has emerged, concentrating on Linux programs with enhanced evasion capabilities and streamlined command execution performance.

This newest iteration represents a big evolution of the malware household first found by ESET’s analysis group, which has been linked to the long-running “Challenge Wooden” malware lineage relationship again to no less than 2005.

The FireWood backdoor operates as a distant entry trojan (RAT) particularly designed for Linux environments, using kernel-level rootkit modules and TEA-based encryption to take care of stealth and set up persistent command-and-control communications.

As soon as deployed, sometimes by means of net shells planted on compromised Linux desktops, the malware allows attackers to execute arbitrary instructions, harvest delicate system data and credentials, and conduct extended espionage operations whereas remaining largely undetected.

Intezer researchers recognized this new variant with the SHA256 hash 898a5bd86c5d99eb70088a90f1d8f90b03bd38c15a232200538d0601c888acb6, noting vital architectural modifications from earlier variations.

The malware maintains low confidence connections to the China-aligned Gelsemium APT group, although these overlaps might mirror shared toolsets throughout a number of risk actors moderately than definitive attribution.

The up to date variant demonstrates notable modifications in its initialization and networking protocols.

Not like earlier variations that applied express permission gates by means of CUser::IsSuc() calls, the brand new iteration removes this early verify solely, as a substitute deferring root-or-kernel validation till after daemonization and PID storage.

This architectural shift splits the previous SavePidAndCheckKernel() perform into discrete elements: an preliminary SavePid(pid) operation adopted by CModuleControl::AutoLoad() and CheckLkmLoad() capabilities.

Enhanced Communication Protocol and System Reconnaissance

The malware’s networking implementation represents a big departure from its predecessor’s advanced timing mechanisms.

New evasion implementation and comparability of primary capabilities (Supply – Intezer)

Whereas older variants employed subtle randomized time-window algorithms with configurable beacon intervals and delay parameters, the brand new model adopts a simplified method utilizing a steady whereas (true) loop construction.

After the configured startup delay, the malware persistently makes an attempt C2 connections by means of ConnectToSvr() calls, implementing transient sleep intervals upon failure till profitable connection institution or timer expiration.

For system reconnaissance, the up to date variant enhances OS detection capabilities by implementing a fallback mechanism.

When the first /and many others/challenge file proves unavailable, the malware routinely makes an attempt to learn distribution data from /and many others/challenge.web, sustaining constant parsing methodologies throughout each sources.

This redundancy ensures dependable system fingerprinting no matter goal configuration variations.

Enhance your SOC and assist your group defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacking, Commands, Data, Execute, Exfiltrate, FireWood, Linux, Malware, Sensitive, Systems

Post navigation

Previous Post: New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
Next Post: Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July

Related Posts

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads Cyber Security News
How to Conduct a Secure Code Review Cyber Security News
MITRE Publishes Post-Quantum Cryptography Migration Roadmap Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News
Ransomware Operations Surge Following Qilin’s New Pattern of Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Personalize Phishing Attacks With Advanced Tactics for Malware Delivery
  • Qilin Ransomware Leads The Attack Landscape With 70+ Claimed Victims in July
  • New FireWood Malware Attacking Linux Systems to Execute Commands and Exfiltrate Sensitive Data
  • New EncryptHub Campaign Leverages Brave Support Platform to Deliver Malicious Payloads via MMC Vulnerability
  • How to Secure Your Online Banking Account

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News