China’s APT Gelsemium Strikes Again with Sneaky Linux Backdoor WolfsBane!

China-linked APT Gelsemium has unleashed WolfsBane, a new Linux backdoor, targeting East and Southeast Asia. Experts believe this shift reflects APTs adapting to tougher Windows defenses, now eyeing Linux vulnerabilities. Looks like even cybercriminals know it’s time to switch systems when Windows tightens its belt!

Pro Dashboard

Hot Take:

Looks like Gelsemium has decided to take a stroll through the Linux woods with their new backdoor, WolfsBane. Who knew cybersecurity espionage could have such a fairytale twist? But instead of candy houses, they’re after sensitive data, and it’s not a witch they’re up against, it’s an EDR solution. Move over, Big Bad Wolf, there’s a new predator on the prowl!

Key Points:

  • Gelsemium APT discovered using a new Linux backdoor, WolfsBane, targeting East and Southeast Asia.
  • WolfsBane mirrors Gelsemium’s Windows backdoor, Gelsevirine, adapting to stronger Windows defenses.
  • The group may have exploited a web app vulnerability to deploy the WolfsBane backdoor.
  • FireWood, another Linux backdoor, is linked to Gelsemium with low confidence.
  • Increased focus on Linux vulnerabilities due to widespread Windows security measures.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?