Description
A newly identified attack campaign by the Chinese cyber-espionage group Evasive Panda (DaggerFly) involves the hijacking of the SSH daemon on network appliances. The attack utilizes a sophisticated malware suite, named ELF/Sshdinjector.A!tr, to gain persistent access and conduct covert operations. This campaign has been active since mid-November 2024, targeting network devices for intelligence collection and espionage.
Attack Details
The attack begins with an initial compromise of network appliances, though the exact infiltration method remains undisclosed. Once a device is breached, a dropper component checks for existing infections and verifies if the system is running with root privileges. If these conditions are met, several binaries, including an SSH library (libssdh.so), are deployed to the target machine.
The injected SSH library serves as the primary backdoor, facilitating command and control (C2) communications and data exfiltration. Other components, such as mainpasteheader and selfrecoverheader, are used to maintain persistence on compromised devices.
The malware can execute fifteen different commands, including:
Remediation
To mitigate the risk of infection from ELF/Sshdinjector.A!tr, organizations should take the following steps:
By implementing these defensive strategies, organizations can significantly reduce the risk posed by this advanced SSH backdoor attack.
PDF Download: Chinese cyberspies use new SSH backdoor in network device hacks
References