Description

A Linux variant of DinodasRAT, a multi-platform backdoor, has been identified by Kaspersky, targeting regions including China, Taiwan, Turkey, and Uzbekistan. Also known as XDealer, DinodasRAT is a C++-based malware capable of harvesting a broad spectrum of sensitive data from compromised systems. The discovery of this Linux version follows previous instances of its deployment in cyber espionage campaigns. In October 2023, ESET disclosed Operation Jacana, which targeted a governmental entity in Guyana using the Windows version of DinodasRAT. More recently, Trend Micro reported on Earth Krahang, a threat activity cluster utilizing DinodasRAT since 2023 in attacks directed at various government entities worldwide. Attributed to several China-associated threat actors, such as LuoYu, the use of DinodasRAT underscores the collaborative tool sharing common among hacking groups affiliated with the nation. Kaspersky's investigation uncovered the Linux variant (V10) of the malware in early October 2023. The earliest known variant (V7) dates back to 2021. Primarily tailored for Red Hat-based distributions and Ubuntu Linux, the malware establishes persistence on infected hosts using SystemV or SystemD startup scripts. It then communicates with a remote server over TCP or UDP to retrieve commands for execution at periodic intervals. DinodasRAT boasts an array of capabilities, including file operations, manipulation of command-and-control (C2) addresses, process enumeration and termination, execution of shell commands, downloading updated versions of the backdoor, and self-uninstallation. Additionally, it employs evasion techniques to evade detection by debugging and monitoring tools. Similar to its Windows counterpart, the Linux variant employs the Tiny Encryption Algorithm (TEA) for encrypting C2 communications. Kaspersky highlighted that DinodasRAT primarily serves to establish and maintain access via Linux servers, emphasizing its functionality in facilitating data exfiltration and espionage activities. The backdoor provides operators with complete control over compromised machines, enabling malicious actors to conduct various operations with impunity.