"Stealthy 'Sedexp' Linux Malware Evaded Detection for Two Years"
Since 2022, a stealthy Linux malware called "sedexp" has evaded detection using a persistence technique not yet included in the MITRE ATT&CK framework. The malware, which was discovered by researchers at the risk management company Stroz Friedberg, allows its operators to create reverse shells for remote access and further the attack. At this time, the researchers point out MITRE ATT&CK has not documented the persistence technique used, emphasizing that sedexp is an advanced threat hiding in plain sight. This article continues to discuss findings regarding the sedexp Linux malware.
BleepingComputer reports "Stealthy 'Sedexp' Linux Malware Evaded Detection for Two Years"
Submitted by grigby1
Submitted by Gregory Rigby
on