Published on February 12, 2025. EST READ TIME: 2 minutes
Evasive Panda, also known as DaggerFly, has been actively targeting network appliances since mid-November 2024 by injecting a novel malware into the SSH daemon (SSHD). This malware, designated “ELF/Sshdinjector.A!tr” by Fortinet’s FortiGuard Labs, allows attackers to hijack SSHD processes, facilitating persistent access and clandestine operations on compromised devices. Upon breaching a system, the attackers deploy a dropper component that verifies if the device is already infected and confirms it operates under root privileges. If these conditions are met, multiple binaries, including a malicious SSH library named “libssdh.so,” are installed. This library serves as the primary backdoor, enabling the attackers to execute a wide range of malicious activities. Evasive Panda has a history of sophisticated cyber-espionage campaigns, including recent supply chain attacks via ISPs in Asia and intelligence gathering from U.S. organizations. This latest development underscores the group’s evolving tactics and the ongoing threat posed by state-sponsored cyber actors.
North Korea's Lazarus Group Rakes in $3 Million: Unveiling Cybercrime's Financial Motivations
Read More 2 min read
Security Vulnerability: Windows Hello Fingerprint Authentication Bypassed on Popular Laptops
Read More 2 min read
Indian Startup Hack-for-Hire: Navigating the Complexities of Ethical Hacking
Read More 2 min read
North Korean Hackers Pose as Job Recruiters in Cyber Espionage Campaign
Read More 2 min read
Analysis Reveals: Bad Bots Constitute a Staggering 73% of Internet Traffic
Read More 2 min read
Menu