Group-IB Uncovers Stealthy Linux RAT “Krasue” Targeting Thai Companies

Cybersecurity firm Group-IB reveals the discovery of a new Linux Remote Access Trojan (RAT) named “Krasue,” utilized by cybercriminals to maintain covert access to the networks of targeted companies in Thailand since 2021.

What you should know

  • Krasue Overview: Group-IB identifies Krasue as a Linux RAT targeting exclusively Thai companies, remaining under the radar since 2021, with potential use in other sectors.
  • Functionality and Detection: Krasue’s core functionality lies in network access maintenance. The malware enters systems through various vectors like vulnerability exploitation, credential attacks, or deceptive downloads, evading detection during initialization.
  • Rootkit and Code Similarities: Krasue employs a rootkit based on Linux Kernel Module rootkits. Notably, it shares similarities with XorDdos, suggesting a common author or access to XorDdos’ source code.
  • Communication Strategy: Krasue uses Real Time Streaming Protocol (RTSP) for communication with its command and control server, a tactic uncommon in this context, potentially aiding in evasion.

Group-IB’s discovery of the sophisticated Linux RAT, Krasue, underscores the ongoing challenges of cyber threats. The firm’s swift response and collaboration with ThaiCERT and TTC-CERT highlight the importance of proactive cybersecurity measures.

Image generated by Adobe Firefly

Author

  • Hello! I’m Mark, the founder of techcoffeehouse.com. I love a good plate of Chicken Rice. So, if you have a story as good as the dish, HMU!

    View all posts Managing Editor

Discover more from techcoffeehouse.com

Subscribe to get the latest posts sent to your email.

Use promo code “TCH15” to get 15% off on checkout.

Share your thoughts

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from techcoffeehouse.com

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from techcoffeehouse.com

Subscribe now to keep reading and get access to the full archive.

Continue reading