218. Adversaries Abuse .Desktop Files to Attack Linux Systems

Hello everyone!

Using phishing emails to obtain the initial access to a Windows host is quite common technique. And we see such emails every day. But what about Linux? Let's look at an example!

According to this report, APT36 leveraged malicious .desktop files to deliver Poseidon - a Mythic agent. These files were masqueraded to look like PDF documents, for example,  Document Details.pdf.desktop. In fact, such files are just shortcut files, but for Linux.

So, if you have Linux workstations, it's a good idea to hunt for suspicious .desktop files:

event_type: "processcreatenix"

AND

cmdline.keyword: /.*\.desktop\s.*/

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge