SpeakUp Trojan Targets Linux Servers

Feb 06, 2019

It’s exploiting a known vulnerability.

Researchers at Check Point have found a new Trojan called SpeakUp that’s infecting Linux servers. SpeakUp exploits known vulnerabilities in Linux and is targeting servers in China.

According to Check Point, “SpeakUp acts to propagate internally within the infected subnet, and beyond to new IP ranges, exploiting remote code execution vulnerabilities. In addition, SpeakUp presented the ability to infect Mac devices with the undetected backdoor.”

The Trojan has spread beyond China and is fast spreading across East Asia and Latin America. It’s not sparing even AWS-hosted Linux servers. Check Point said six Linux distributions and macOS are vulnerable, but they didn’t name exactly which six Linux distributions.

SpeakUp’s initial infection vector targets a known vulnerability in ThinkPHP and then uses command injection techniques for uploading a PHP shell that serves and executes a Perl backdoor. After executing the script to install the backdoor, it deletes the file to remove any evidence.

Check Point warns that while the initial payload of SpeakUp is mining, it poses a much bigger threat. “The threat actor behind this campaign can at any given time deploy additional payloads, potentially more intrusive and offensive. It has the ability to scan the surrounding network of an infected server and distribute the malware.”

Related content

  • NEWS

    Linux Kernel continues to offer mitigation for Spectre Mitigation, SpeakUp Trojan targets Linux servers, KDE Plasma 5.15 beta arrives, Canonical announces latest Ubuntu Core for IoT, vulnerabilities found in Cisco routers, two new malware campaigns, and US government shutdown ties up $139.2 million in grant funding.

  • Trojan Turns Raspberry Pi into a Cryptocurrency Mining Device

    Two trojans in the wild are targeting Linux machines.

  • Viruses in Linux

    Some say an attack is looming, and others say we don’t have to worry. What’s the real story on viruses in Linux?

  • Backdoors

    Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News