New Linux malware hides from traditional detection methods

August 25, 2024 Cybersecurity researchers have discovered a new piece of Linux malware named “sedexp,” which uses innovative techniques to evade detection and persist on infected systems. Attributed to a financially motivated threat actor, sedexp utilizes udev rules to maintain persistence by executing malicious code whenever specific device events occur.  This method allows the malware to hide credit card skimmer code and other malicious activities, such as launching a reverse shell for remote access but to call the code based on a triggering event, such as a reboot.

By embedding itself within the system’s operational routines, sedexp can remain undetected while facilitating unauthorized access and data theft, particularly targeting financial information on web servers. The discovery of this malware demonstrates the increasing sophistication and adaptability of threat actors in developing new methods to compromise systems and exfiltrate sensitive data.

The discovery of sedexp underscores the importance of robust cybersecurity measures and continuous monitoring to detect and mitigate advanced threats. As attackers increasingly employ unconventional techniques to bypass traditional security defenses, organizations must stay vigilant and employ comprehensive security strategies to protect their systems and data from such evolving threats.

Top Stories

Related Articles

May 20, 2026 The Cybersecurity and Infrastructure Security Agency, the arm of the U.S. government tasked with protecting critical infrastructure more...

May 11, 2026 Instructure has restored access to its Canvas learning platform after a cyberattack disrupted service for universities and more...

May 6, 2026 The official White House mobile app for iOS and Android is facing scrutiny after a security researcher more...

May 4, 2026 Microsoft Defender mistakenly detected legitimate DigiCert root certificates as malware, triggering widespread false-positive alerts and, in some more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn