TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

New ultra-stealthy Linux backdoor isn’t your everyday malware discovery

6 pointsby givinguflacalmost 3 years ago

1 comment

theamkalmost 3 years ago
&gt; it is a shared object (SO) library that is loaded into all running processes using LD_PRELOAD<p>Doesn&#x27;t seem that stealthy to me, checking `&#x2F;proc&#x2F;*&#x2F;environ` is fairly standard. Or just typing &quot;set&quot;.. or &quot;env&quot;.. or calling &quot;print(os.environ)&quot; or calling &quot;php_info()&quot;... The linked article tells more about this malware, and it seems it has no countermeasures to such simple things.<p>And not to mention that all Go programs do not use dynamic linker, so any system tool written in Go will not be affected.