Chinese hackers target Linux with new WolfsBane malware

Share:

A new Linux backdoor called ‘WolfsBane’ has been discovered, believed to be a port of Windows malware used by the Chinese ‘Gelsemium’ hacking group.

ESET security researchers who analyzed WolfsBane report that WolfsBane is a complete malware tool featuring a dropper, launcher, and backdoor, while it also uses a modified open-source rootkit to evade detection.

The researchers also discovered ‘FireWood,’ another Linux malware that appears linked to the ‘Project Wood’ Windows malware.

However, FireWood is more likely a shared tool used by multiple Chinese APT groups rather than an exclusive/private tool created by Gelsemium.

ESET says the two malware families, both appearing on VirusTotal over the last year, are part of a broader trend where APT groups increasingly target Linux platforms due to Windows security getting stronger.

“The trend of APT groups focusing on Linux malware is becoming more noticeable. We believe this shift is due to improvements in Windows email and endpoint security, such as the widespread use of endpoint detection and response (EDR) tools and Microsoft’s decision to disable Visual Basic for Applications (VBA) macros by default. Consequently, threat actors are exploring new attack avenues, with a growing focus on exploiting vulnerabilities in internet-facing systems, most of which run on Linux.”

❖ ESET

WolfsBane’s stealthy howl

WolfsBane is introduced to targets via a dropper named ‘cron,’ which drops the launcher component disguised as a KDE desktop component.

Depending on the privileges it runs with, it disables SELinux, creates system service files, or modifies user configuration files to establish persistence.

The launcher loads the privacy malware component, ‘udevd,’ which loads three encrypted libraries containing its core functionality and command and control (C2) communication configuration.

WolfsBane's execution flow
WolfsBane’s execution flow
Source: ESET

Finally, a modified version of the BEURK userland rootkit is loaded via ‘/etc/ld.so.preload’ for system-wide hooking to help hide processes, files, and network traffic related to WolfsBane’s activities.

“The WolfsBane Hider rootkit hooks many basic standard C library functions such as openstatreaddir, and access,” explains ESET.

“While these hooked functions invoke the original ones, they filter out any results related to the WolfsBane malware.”

WolfsBane’s main operation is to execute commands received from the C2 server using predefined command-function mappings, which is the same mechanism as the one used in its Windows counterpart.

These commands include file operations, data exfiltration, and system manipulation, giving Gelsemium total control over compromised systems.

Command names on Linux (left) and Windows backdoors (right)
Command names on Linux (left) and Windows backdoors (right)
Source: ESET

FireWood overview

Though only loosely linked to Gelsemium, FireWood is another Linux backdoor that could enable versatile, long-term espionage campaigns.

Its command execution capabilities enable operators to perform file operations, shell command execution, library loading/unloading, and data exfiltration.

ESET identified a file named ‘usbdev.ko,’ which is suspected of operating as a kernel-level rootkit, providing FireWood with the ability to hide processes.

The malware sets its persistence on the host by creating an autostart file (gnome-control.desktop) in ‘.config/autostart/,’ while it can also include commands in this file to execute them automatically on system startup.

A comprehensive list of indicators of compromise associated with the two new Linux malware families and Gelsemium’s latest campaigns are available on this GitHub repository.

Bill Toulas

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
12:47 pm, Jul 4, 2025
weather icon 24°C
L: 23° | H: 26°
overcast clouds
Humidity: 41 %
Pressure: 1026 mb
Wind: 9 mph WSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 89%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:49 am
Sunset: 9:19 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
23° | 26°°C 0 mm 0% 13 mph 42 % 1026 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
14° | 19°°C 0.97 mm 97% 13 mph 90 % 1021 mb 0 mm/h
Sun Jul 06 10:00 pm
weather icon
16° | 20°°C 1 mm 100% 10 mph 89 % 1010 mb 0 mm/h
Mon Jul 07 10:00 pm
weather icon
14° | 23°°C 1 mm 100% 13 mph 77 % 1016 mb 0 mm/h
Tue Jul 08 10:00 pm
weather icon
13° | 25°°C 0 mm 0% 9 mph 77 % 1020 mb 0 mm/h
Today 1:00 pm
weather icon
24° | 24°°C 0 mm 0% 9 mph 42 % 1026 mb 0 mm/h
Today 4:00 pm
weather icon
24° | 25°°C 0 mm 0% 12 mph 37 % 1025 mb 0 mm/h
Today 7:00 pm
weather icon
23° | 23°°C 0 mm 0% 13 mph 31 % 1023 mb 0 mm/h
Today 10:00 pm
weather icon
20° | 20°°C 0 mm 0% 10 mph 40 % 1022 mb 0 mm/h
Tomorrow 1:00 am
weather icon
19° | 19°°C 0 mm 0% 10 mph 50 % 1021 mb 0 mm/h
Tomorrow 4:00 am
weather icon
17° | 17°°C 0 mm 0% 10 mph 52 % 1019 mb 0 mm/h
Tomorrow 7:00 am
weather icon
14° | 14°°C 0.97 mm 97% 9 mph 90 % 1018 mb 0 mm/h
Tomorrow 10:00 am
weather icon
17° | 17°°C 0.7 mm 70% 10 mph 82 % 1017 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,668.34
-0.56%
Ethereum(ETH)
€2,169.87
-1.49%
Tether(USDT)
€0.85
0.00%
XRP(XRP)
€1.90
-2.56%
Solana(SOL)
€127.90
-2.58%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.141759
-3.79%
Shiba Inu(SHIB)
€0.000010
-2.90%
Pepe(PEPE)
€0.000008
-5.78%
Scroll to Top