Recently, researchers at Qihoo 360 Network Security discovered a particularly stealthy piece of malware designed to create backdoors in the Linux ecosystem.

It was so good at its job, and so stealthy that it went completely undetected for years. That gave the hackers controlling it a convenient access point literally for years.

Based on the company’s research, the first sample they could find of the malicious code they dubbed RotaJakiro, was uploaded in 2018. It took more than three years for anyone to become aware of its existence, and in the computer world, three years is just shy of eternity.

A Qihoo spokesman had this to say about the recent discovery:

At the functional level, RotaJakiro first determines whether the user is root or non-root at run time, with different execution policies for different accounts, then decrypts the relevant sensitive resources using AES& ROTATE for subsequent persistence, process guarding and single instance use, and finally establishes communication with C2 and waits for the execution of commands issued by C2.

RotaJakiro supports a total of 12 functions, three of which are related to the execution of specific Plugins. Unfortunately, we have no visibility to the plugins, and therefore do not know its true purpose.”

In all, the company’s researchers discovered four code samples online, all of them dating back to 2018, and none of them having ever been detected before Qihoo discovered them.

Of interest, RotaJakiro seems to have code in common with the Torii IoT botnet. That botnet was discovered by Vesselin Bontchev in September of 2018 and analyzed in depth by the Threat Intelligence Team run by Avast. Torii and RotaJakiro share a number of similarities including “the use of encryption algorithms to hide sensitive resources, the implementation of a rather old-school style of persistence, structured network traffic.”

In any case, this isn’t a widespread, pervasive threat, so odds are that you’ll never actually run across it. Even so, it’s an interesting bit of code to be aware of.

Related Posts - TKS Blog
TKS Newsletter - 2025 October
Here's our October 2025 Newsletter Read the full PDF version here: The TKS Sentinel - October Issue In this month's edition, we discuss: October is Cybersecurity Awareness...
Read more
Mastering End-of-Year IT Budgeting for Business Growth
As we enter Q4 and the year winds down, many business leaders and IT directors find themselves knee-deep in spreadsheets, reviewing expenses, and forecasting next...
Read more
Cybersecurity for Business Owners: Building a Strong Defense
In today’s hyperconnected world, cybercrime is the new frontier of theft. Attacks no longer happen in dark alleys; they occur in inboxes, networks, and cloud...
Read more
Cybersecurity Awareness Month: Strengthen Your Business Defenses
October is Cybersecurity Awareness Month, a timely reminder that every business is a potential target, regardless of size or industry. Even if you think your...
Read more

Used with permission from Article Aggregator