Description
A newly discovered Linux backdoor named Auto-Color has been identified in cyberattacks targeting government institutions and universities in North America and Asia. The malware, first observed between November and December 2024, is highly evasive and designed for long-term persistence. Researchers at Palo Alto Networks Unit 42 identified Auto-Color as a sophisticated threat capable of maintaining unauthorized access and evading detection through stealthy persistence mechanisms and encryption techniques.
Auto-Color shares some similarities with the Symbiote Linux malware family, previously documented by BlackBerry in 2022. However, researchers have confirmed that it is a distinct strain, featuring unique persistence mechanisms and stealth capabilities.
Attack Details
While the initial infection vector remains unknown, the malware executes using files disguised under common names such as “door,” “egg,” and “log.” If it gains root privileges, it deploys a malicious library implant (libcext.so.2), masquerading as a legitimate library (libcext.so.0), and modifies system files to ensure persistent execution. Auto-Color modifies the ‘/etc/ld.preload’ file to execute before legitimate system libraries, establishing remote access to a command-and-control (C2) server that allows attackers to issue commands stealthily. The malware encrypts communications with a custom algorithm and dynamically changes encryption keys to avoid detection. It also functions as a rootkit by hooking libc functions to intercept system calls, modifying files like ‘/proc/net/tcp’ to conceal its presence. Furthermore, Auto-Color includes a kill switch that erases infection traces, hindering forensic analysis. Once connected to the C2 server, attackers can open a reverse shell for full remote access, execute arbitrary commands, modify or create files to expand the infection, act as a proxy to forward traffic, and dynamically adjust its configuration.
Indicators of Compromise (IoCs)
There are several indicators of compromise, including:
Remediation
To defend against Auto-Color and similar threats, security teams should implement the following measures:
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: Auto-Color Linux Backdoor Targets North American Governments and Universities
References