Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Location-Based Gaming NFTs: How GPS and Blockchain Are Changing the Way We Play

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Sophisticated Malware Campaign Targets Windows and Linux Systems
Sophisticated Malware Campaign Targets Windows and Linux Systems
Security

Sophisticated Malware Campaign Targets Windows and Linux Systems

February 14, 2026No Comments2 Mins Read

A newly uncovered malware campaign targeting both Windows and Linux systems has revealed advanced evasion and credential theft techniques, according to the Sysdig Threat Research Team (TRT).

The operation began with a malicious Python script uploaded via a misconfigured system, enabling the download of crypto-miners and the deployment of stealthy tools for evasion and data exfiltration.

This multi-platform attack employed distinct paths for Linux and Windows, adapting its strategy based on the target operating system.

On Windows, attackers used a Python function to install the Java Development Kit (JDK), which facilitated the execution of a Java Archive (JAR) file retrieved from a previously active command-and-control (C2) server. The JAR file application-ref.jar functioned as a loader, initiating a chain of malicious components.

Two files from the JAR’s resources, renamed INT_D.DAT and INT_J.DAT, were deployed to the victim’s machine. The malware then used a ProcessBuilder command with suspicious flags such as -noverify and -XX:+DisableAttachMechanism, commonly seen in malicious Java processes to avoid detection and disable debugging.

Read more on malware evasion techniques: CoffeeLoader Malware Loader Linked to SmokeLoader Operations

Among the most concerning payloads were multiple infostealers embedded within the final JAR.

These components performed:

  • Credential theft from Chrome extensions

  • Token harvesting from Discord via HTTP header inspection

  • Hardware and system reconnaissance using PowerShell and WebSockets

The attack also delivered a native DLL file, app_bound_decryptor.dll, which performed XOR encoding/decoding, manipulated Windows named pipes and included sandbox evasion checks like IsDebuggerPresent() and IsProcessorFeaturePresent.

Detection Challenges and Misconfiguration Risks

This campaign highlights two key issues: the ongoing risk posed by misconfigured systems, and the need for effective detection strategies.

See also  KyberSwap Hacker Transfers Stolen Funds to Tornado Cash

In this case, an exposed web interface allowed remote attackers to upload and execute malicious scripts, opening the door to a broader compromise. Such oversights remain a common and preventable vector in many intrusions.

To detect threats of this nature, organizations should rely on a combination of behavior-based monitoring, anomaly detection and layered runtime security controls.

Techniques such as YARA scanning, process behavior analysis and DNS monitoring can help flag suspicious activity early.

Source link

Campaign Linux Malware Sophisticated Systems Targets Windows

Related Posts

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026
Top Posts

Could This Week’s Major Economic Events Impact Crypto Markets?

September 25, 2023

Online Travel Booking Platform Market: Growth Factors, Emerging Trends & Key Player Insights

February 26, 2026

Exxon “Days Away” From Buying Shale Giant Pioneer In “Seismic Deal” That Will Reshape US Energy

October 6, 2023

Type above and press Enter to search. Press Esc to cancel.