• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Hackers from Russia are using a simple Trojan to target Linux systems

By Guest Authors

A group of hackers dedicated to espionage attacks based in Russia has been targeting Linux computers using a simple Trojan malware that requires no root privileges, meaning the attackers have the option to install the malware using any account.

Pawn Storm, a cyberespionage group that has been active since more or less eight years ago, is known for its involvement in attacks that hit governmental, security and military organizations that belong to North Atlantic Treaty Organization countries.

The group uses a very simple Trojan malware to infect Linux systems, not only of those NATO organizations but also of defense companies and media outlets. Hackers from this group appear to be targeting  political activists in Ukraine and critics of the Russian government.

kronos-trojan

Despite the simplicity of the Trojan, the effectiveness of the attack is remarkable. The group uses zero day exploits and spear phishing campaigns in order to spread files with malicious links and content attached to them. The group also targets other operating systems such as Windows through a backdoor program, as well as for Mac OS X through other malware tools.

The main tool used by these hackers is called Fysbis, a sort of Trojan that has a modular architecture for future enhancements and expansion to what it can perform through the addition of plug-ins. Palo Alto Networks, which discovered the Trojan, reported that the malware has the ability to install itself to a target computer even without a root privilege, which hackers typically require to gain privilege access to a protected system.

The goal is to steal data from infected systems for espionage and other malicious ends. So it does not really need to take control of the entire system, but only to access and pilfer sensitive data. At other times, the hackers spy on the browsing history of the victims and other related activities the user does with his or her computer.

The Fysbis attack demonstrates one glaring fact about the threat landscape: that it does not have to grow in sophistication in order to carry out their goals. It also highlights the weakness of the Linux system, often perceived as rather the most secure of all operating systems.

Also, it would be hard for organizations to detect Linux vulnerabilities in their systems because enterprises often invest in the protection, maintenance and security for their Windows systems. The increasing negligence toward Linux systems is what drives attackers to focus more on this infrastructure, which is still in wide use at present.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

ELECFREAKS micro:bit XGO Rider Kit Review – Introduce Robotics to Kids

GOOLOO A7 Jump Starter with Air Compressor Review – The Ultimate Emergency Tool for Your Car

Baseus EnerGeek GX11 Review: The Power Bank That Keeps You Online

AWOL Vision LTV-3500 Pro Review: A 4K UST Laser Projector with Dolby Vision for Daytime Viewing

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Pexar’s New Starlight 15.6″ Digital Frame Is Now Available – and On Sale for Black Friday
  • ELECFREAKS micro:bit XGO Rider Kit Review – Introduce Robotics to Kids
  • The New Era of Floor Cleaners: How Technology Is Redefining Home Cleaning
  • PawSwing Neo Cat House – Turns Cat Grooming into Self-Care

Copyright © 2025 · All Rights Reserved