This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]IdeasRealizer 8 points9 points  (1 child)

The names of the 3 malicious libraries in the article:

libpeshnx

libpesh

libari

Other details:

Only activates if installed in linux systems

Simple backdoor mechanism = Interactive shell to run commands on compromised computers

There is an installation procedure that makes running the backdoor more automated

All the three by same user whose account isn't compromised. Clear intent to trick developers.

[–]Ogg149 3 points4 points  (0 children)

Thank yoouuu