New Linux malware hides from traditional detection methods

August 25, 2024 Cybersecurity researchers have discovered a new piece of Linux malware named “sedexp,” which uses innovative techniques to evade detection and persist on infected systems. Attributed to a financially motivated threat actor, sedexp utilizes udev rules to maintain persistence by executing malicious code whenever specific device events occur.  This method allows the malware to hide credit card skimmer code and other malicious activities, such as launching a reverse shell for remote access but to call the code based on a triggering event, such as a reboot.

By embedding itself within the system’s operational routines, sedexp can remain undetected while facilitating unauthorized access and data theft, particularly targeting financial information on web servers. The discovery of this malware demonstrates the increasing sophistication and adaptability of threat actors in developing new methods to compromise systems and exfiltrate sensitive data.

The discovery of sedexp underscores the importance of robust cybersecurity measures and continuous monitoring to detect and mitigate advanced threats. As attackers increasingly employ unconventional techniques to bypass traditional security defenses, organizations must stay vigilant and employ comprehensive security strategies to protect their systems and data from such evolving threats.

Top Stories

Related Articles

April 27, 2026 Canada Life says it has contained a cybersecurity incident involving unauthorized access to internal applications through an more...

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn