"Fake Linux Vulnerability Exploit Drops Data-Stealing Malware"
A fake proof-of-concept (PoC) exploit that installs Linux password-stealing malware targets cybersecurity researchers and threat actors. The fake PoC claims to be an exploit for a critical use-after-free vulnerability, tracked as CVE-2023-35829, affecting Linux kernel versions before 6.3.2. During their routine scans, Uptycs analysts discovered the malicious PoC exploit when detection systems flagged anomalies such as unexpected network connections, unauthorized system access attempts, and unusual data transfers. Three repositories were discovered to be hosting the malicious PoC exploit. According to Uptycs, the malicious PoC exploit has been widely distributed within the security research community, so infections may exist on many computers. This article continues to discuss the fake PoC exploit that drops data-stealing malware.
Bleeping Computer reports "Fake Linux Vulnerability Exploit Drops Data-Stealing Malware"