Skidmap malware drops LKMs on Linux machines to enable cryptojacking

Skidmap malware drops LKMs on Linux machines to enable cryptojacking

Researchers have discovered a sophisticated cryptomining program that uses loadable kernel modules (LKMs) to help infiltrate Linux machines, and hides its malicious activity by displaying fake network traffic stats.


Dubbed Skidmap, the malware can also grant attackers backdoor access to affected systems by setting up a secret master password that offers access to any user account in the system, according to Trend Micro threat analysts Augusto Remillano II and Jakub Urbanec in a company blog post today.


“Skidmap uses fairly advanced methods to ensure that it and its components remain undetected. For instance, its use of LKM rootkits – given their capability to overwrite or modify parts of the kernel – makes it harder to clean compared to other malware,” the blog post states. “In addition, Skidmap has multiple ways to access affected machines, which allow it to reinfect systems that have been restored or cleaned up.”


After its installation, the malware downloads its main binary, “pc,” which either reconfigures or outright disables an infected machine’s Security-Enhanced Linux (SELinux) policy. It then establishes backdoor access by adding an unautho ..

Support the originator by clicking the read the rest link below.