Chinese APT Gelsemium Unleashes ‘Wolfsbane’ Linux Variant

Published:

The Rise of Linux Malware: Gelsemium’s New Backdoors

In recent months, the cybersecurity landscape has witnessed a significant shift with the emergence of two well-documented Chinese backdoors, Wolfsbane and Firewood, now modified to operate on Linux systems. This development marks a notable evolution in the tactics of the advanced persistent threat (APT) group known as Gelsemium, which has historically focused on information gathering from Windows environments. As organizations increasingly adopt Linux for their server needs, the malware landscape is adapting, and experts are taking notice.

Gelsemium: A Decade of Espionage

Gelsemium has been a prominent player in the cyber espionage arena for over a decade. Initially targeting Windows systems, the group has now expanded its toolkit to include Linux, reflecting a broader trend in the cybersecurity landscape. The new malware variants, Wolfsbane and Firewood, can trace their lineage back to 2005, showcasing the group’s ability to evolve and adapt over time.

The first public sample of Wolfsbane was uploaded to VirusTotal on March 6, 2023, from Taiwan, with subsequent uploads from the Philippines and Singapore. Historically, Gelsemium has targeted entities in the Middle East and East Asia, indicating a strategic focus on regions of interest. Contextual evidence suggests that the malware authors have been exploiting vulnerabilities in Java Web applications to gain access to public-facing Apache Tomcat servers.

The Wolfsbane & Firewood Backdoors

Wolfsbane is particularly noteworthy as it represents a Linux port of Gelsevirine, a Windows backdoor previously utilized by Gelsemium. This adaptation features a modified Beurk Experimental Unix RootKit, allowing it to conceal its malicious activities effectively. The malware’s design highlights the group’s commitment to maintaining a foothold in diverse operating environments.

In addition to Wolfsbane, a second backdoor known as Firewood has emerged. While not definitively linked to Gelsemium, Firewood possesses a kernel-level rootkit, enhancing its capabilities beyond those of typical backdoors. Interestingly, Firewood appears to be the latest evolution of "Project Wood," a lineage of backdoors that can be traced back to a program first compiled in January 2005. The evolution of these backdoors underscores the persistent threat posed by Gelsemium and its ability to innovate.

Understanding the Surge in Linux Cyber Threats

The rise of Linux-based threats is particularly striking in the context of an overall increase in cyber threats. Since at least 2020, cybersecurity vendors have reported double- and triple-digit year-over-year increases in Linux attacks. The annual "Global Threat Report" from Elastic Security consistently finds that the Linux threat landscape is expanding rapidly, often outpacing that of macOS and closely resembling the volume of attacks seen on Windows systems.

In 2023, for instance, 54% of endpoint attacks targeted Linux-based devices, compared to just 39% for Windows. This shift indicates a growing recognition among cyber adversaries of the value of Linux systems, particularly in enterprise environments where they are increasingly deployed for critical operations.

Factors Driving the Increase in Linux Threats

Several factors contribute to the surge in Linux cyber threats. One significant reason is the widespread adoption of Linux in enterprise environments, as organizations seek robust and cost-effective solutions for their server needs. Jason Soroko, a senior fellow at Sectigo, notes that adversaries are developing cross-platform malware to maximize their reach, capitalizing on the growing reliance on Linux.

Additionally, the improving security posture of Windows systems may be pushing attackers to focus on Linux, where they perceive vulnerabilities to exploit. ESET has suggested that the enhanced security measures in Windows environments could be driving adversaries to seek out less fortified targets.

Jake King, head of threat and security intelligence at Elastic, points out that the increasing sophistication of attacks on Linux is also a factor. For example, the discovery of the XZ/Liblzma backdoor earlier this year illustrates the evolving tactics of cyber adversaries, who are now targeting Linux hosts for supply chain compromises.

Conclusion: A New Era of Cybersecurity Vigilance

The emergence of Wolfsbane and Firewood as Linux-based backdoors is a clear indication of the evolving threat landscape. As organizations continue to adopt Linux for their server needs, the need for robust cybersecurity measures becomes increasingly critical. The rise in Linux malware not only highlights the adaptability of threat actors like Gelsemium but also underscores the importance of vigilance in cybersecurity practices.

As the malware landscape continues to evolve, organizations must remain proactive in their defense strategies, ensuring that they are equipped to handle the growing threat of Linux-based attacks. The time has come for a renewed focus on securing Linux environments, as the battle against cyber threats is far from over.

Related articles

Recent articles