Sneaky Linux Malware Evades Detection for Two Years, Experts Reveal

A stealthy Linux malware called “sedexp” has evaded detection for over two years by exploiting udev rules, giving attackers remote access while remaining hidden.

Pro Dashboard

Hot Take:

If you thought finding Waldo was tough, try finding sedexp! This elusive Linux malware has been playing hide-and-seek with antivirus software for over two years, and it’s winning!

Key Points:

  • sedexp, a new Linux malware, has been evading detection for more than two years.
  • It uses udev rules, a device manager in the Linux kernel, to remain hidden.
  • The malware disguises its process name as ‘kdevtmpfs’ to avoid detection.
  • It is suspected to have been used for hiding credit card skimmers.
  • Stroz Friedberg discovered sedexp and detailed its operation.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?