Linux Malware WolfsBane and FireWood Linked to Gelsemium APT

Written by

Recent discoveries have unveiled two new malware strains, WolfsBane and FireWood, targeting Linux systems.

These advanced tools have been attributed by ESET to the notorious Gelsemium Advanced Persistent Threat (APT) group, a cyber-espionage entity with a history of targeting government, business and critical infrastructure sectors.

WolfsBane and FireWood Malware Tools

Security researchers uncovered WolfsBane and FireWood as part of a sophisticated toolkit designed to compromise Linux environments. WolfsBane, attributed with high confidence to Gelsemium, serves as a stealthy loader designed to infiltrate targeted systems and enable the deployment of additional malware modules.

FireWood, on the other hand, has been attributed to Gelsemium with lower confidence, as its connection relies on circumstantial overlaps in code and behavior patterns. FireWood functions as a remote access tool (RAT), granting attackers persistent access to compromised systems. Once deployed, it facilitates surveillance, the collection of sensitive data and exfiltration operations.

Both malware strains employ advanced obfuscation techniques, complicating detection and analysis. Researchers have linked their operations to Gelsemium through overlaps in code, infrastructure and targeting patterns observed in previous campaigns.

The Gelsemium Threat

Gelsemium, active since at least 2014, is a highly sophisticated threat actor known for long-term, targeted attacks. According to ESET, the group’s recent focus on Linux systems highlights the growing trend among cybercriminals to exploit non-Windows platforms, which are increasingly deployed on servers, cloud environments and Internet of Things (IoT) devices.

Read more about Linux-based attacks: Helldown Ransomware Expands to Target VMware and Linux Systems

“From our perspective, this development can be attributed to several advancements in email and endpoint security,” ESET said. “The ever-increasing adoption of EDR solutions, along with Microsoft’s default strategy of disabling VBA macros, are leading to a scenario where adversaries are being forced to look for other potential avenues of attack.”

The security firm also explained that the emergence of WolfsBane and FireWood underscores the need for enhanced security measures across all platforms, especially Linux.

Organizations are advised to regularly update and patch their systems, monitor for unusual activity in Linux environments and implement endpoint detection and response (EDR) solutions that can identify sophisticated threats.

What’s hot on Infosecurity Magazine?