New Linux malware hides from traditional detection methods

August 25, 2024 Cybersecurity researchers have discovered a new piece of Linux malware named “sedexp,” which uses innovative techniques to evade detection and persist on infected systems. Attributed to a financially motivated threat actor, sedexp utilizes udev rules to maintain persistence by executing malicious code whenever specific device events occur.  This method allows the malware to hide credit card skimmer code and other malicious activities, such as launching a reverse shell for remote access but to call the code based on a triggering event, such as a reboot.

By embedding itself within the system’s operational routines, sedexp can remain undetected while facilitating unauthorized access and data theft, particularly targeting financial information on web servers. The discovery of this malware demonstrates the increasing sophistication and adaptability of threat actors in developing new methods to compromise systems and exfiltrate sensitive data.

The discovery of sedexp underscores the importance of robust cybersecurity measures and continuous monitoring to detect and mitigate advanced threats. As attackers increasingly employ unconventional techniques to bypass traditional security defenses, organizations must stay vigilant and employ comprehensive security strategies to protect their systems and data from such evolving threats.

Top Stories

Related Articles

March 19, 2026 The FBI has gone back to purchasing commercially available data, including Americans’ location histories, to support federal more...

March 12, 2026 A cyber attack has disrupted global operations at medical technology company Stryker after hackers reportedly wiped corporate more...

March 10, 2026 Microsoft is introducing a new top-tier Microsoft 365 subscription called E7 that bundles its Copilot artificial intelligence more...

March 10, 2026 Dutch intelligence agencies say Russian state-linked hackers are conducting a global campaign to compromise Signal and WhatsApp more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn