Skip to content
  • Home
  • Services
    • Combo Plans
      • Shared Support
      • Semi Dedicated Support
      • Dedicated Support
    • Control Panel Support
      • DirectAdmin Support
      • cPanel Support
      • Plesk Support
    • Server Setup & Support
  • Products
    • Managed Migration
    • Nginx Support
    • Varnish Support
    • Shield
  • Careers
    • Internship Programme
  • KnowledgeBase
  • Contact Us
  • Blog
  • About Us

WHM-cPanel Control Panel

4
  • How to log in to cPanel?
  • How to find outdated services in cPanel
  • Exclude services from the outdated services script’s check in cPanel
  • catch-all accounts, and how to add that in cPanel

Email

3
  • How to install mail function on a Centos server.
  • SPF, DKIM, and DMARC records explained
  • How to configure an Email account manually on the Thunderbird client

SSL certificates

3
  • How to install SSL on nginx with Let’s Encrypt
  • SSL installation and renewal on an Nginx server
  • Installation of SSL in Haproxy and HTTP to HTTPS Redirection

Webservers

1
  • Enable GZIP compression in Nginx

Security

1
  • Disabling mail alerts from LFD

News

46
  • White House report on Open-source AI models
  • Linux Kernel 6.9 – End of Life
  • Verify if SystemD or not on Linux
  • SLUBStick: A Groundbreaking Kernel Exploitation Technique
  • Top 5 Linux Distros for Every User Level
  • Alpaca: The Open-Source AI Model for Linux Enthusiasts
  • Zero-Day Threat: The Risks of the IP Address Exploit
  • Intel Engineer Boosts Linux Kernel Boot Time by 0.035 Seconds
  • Canonical’s New Aggressive Kernel Policy: Ubuntu Releases
  • KDE Frameworks 6.5 Released: What’s New?
  • Ubuntu 24.10 to Feature the Latest Linux Kernel
  • Linux 6.11-rc3 Released: Performance Boosts and Key Fixes
  • The Open Model Initiative Joins the Linux Foundation
  • New Study Debunks Fears of AI Threats
  • AI-Powered Screenshot Search for Pixel 9 Devices
  • Fastfetch: A High-Performance Alternative to Neofetch
  • Containers: Efficient OS-Level Virtualization & Top Tools
  • Tails 6.6-Enhanced Security, Anonymity,Decentralized Features
  • Kubernetes 1.31 “Elli” Release: New Features and Updates
  • Unleashing the Power of Arch Linux with Archinstall 2.8.2
  • Deepin 23 Released with Atomic Updates and Broad CPU Support
  • Secure Your Linux Systems with Expert Cybersecurity
  • NGINX Fixes Buffer Overread Vulnerability (CVE-2024-7347)
  • Linux Kernel Flaw Lets Attackers Bypass CPU and Write to Memory
  • 0.0.0.0 Day Vulnerability:18-Year-Old Browser Flaw
  • CachyOS August 2024: Open NVIDIA Modules & COSMIC Desktop
  • Windows Update Breaks Linux Boot on Dual-Boot Systems
  • EasyOS 6.2 Released: Lightweight Linux Distro-New Features
  • Upstreaming Linux Kernel Support for Raspberry Pi 5
  • Canonical Pauses Ubuntu Kernel Updates Until October 2024
  • 9 Years of LVFS: Transforming Linux Firmware Updates
  • Record Bounty Awarded for LiteSpeed Cache Vulnerability
  • Red Hat OpenShift Lightspeed: AI Assistant for OpenShift
  • Linux 6.12 Introduces QR Code in DRM Panic Handler
  • Rust for Linux Maintainer Resigns Amid ‘Nontechnical Nonsense’
  • Ubuntu 24.10 to Feature Latest Linux 6.11 Kernel
  • LinkedIn Migrates from CentOS to Azure Linux
  • Linux 6.11-rc5 Released with Streamlined Bcachefs Fixes
  • AMD Preferred Core Fix Arrives Before Linux 6.11-rc6
  • Debian 12.7 Released: 55 Security Updates, 51 Bug Fixes
  • 4MLinux 46 Released: New Apps, LAMP Server Included
  • Cicada3301 Ransomware Targets VMware ESXi Systems
  • Advanced Linux Persistence Techniques: Elastic Security’s Insights
  • Sedexp Malware Evades Detection for Two Years on Linux
  • Minimal Linux Runs on Raspberry Pi’s RP2350 Microcontroller
  • Manage Linux User Activity with Acct/Psacct

Operating System

1
  • CentOS 7 End-of-Life: What You Need to Know and How to Migrate
  • Home
  • KnowledgeBase
  • News
  • Sedexp Malware Evades Detection for Two Years on Linux
View Categories

Sedexp Malware Evades Detection for Two Years on Linux

1 min read

A recent discovery by Aon Security has unveiled a new Linux malware, dubbed “sedexp,” that managed to stay under the radar for two years. This stealthy malware has been actively targeting Linux systems since 2022, compromising devices while remaining undetected.

sedexp linux

Organizations relying on Linux systems should be particularly vigilant and scan their devices for potential infiltration.

How Sedexp Exploits udev Rules #

The sedexp malware is linked to a financially motivated threat actor, focusing on maintaining persistent access to infected devices. It achieves this by exploiting udev rules—a critical component of the Linux device management system. These rules enable the system to “match devices and execute actions” when devices are added or removed.

This cleverly exploits this functionality by triggering its execution every time the /dev/random file loads. Since this file is accessed during every system reboot, the malware runs consistently, hiding in plain sight and reactivating with each reboot.

Key Functions of Sedexp Malware #

The primary goal of sedexp is to maintain persistence on the infected device. However, it also carries out two other significant functions that make it particularly dangerous:

  • Reverse Shell Capability: Sedexp provides attackers with full control over the target system through a reverse shell. This capability allows the attacker to execute commands and manipulate the system remotely, further compromising its security.
  • Memory Modification: The malware actively modifies memory to conceal its presence. It hides any files containing the string “sedexp” from being detected by standard system commands, making it incredibly difficult to spot and remove.

Technical Analysis and Threat Implications #

Researchers from Aon Security have conducted an in-depth technical analysis of sedexp, detailing how this malware operates and the risks it poses. Although the exact identity of the threat actors remains unclear, the researchers have linked sedexp to credit card scraping activities. In these cases, hiding the malware code is crucial for the attackers to avoid detection while they siphon sensitive financial data.

Adding to its stealthy nature, the researchers found multiple public instances of sedexp in an online sandbox, all with zero detections. This finding underscores the malware’s sophisticated evasion techniques and highlights the importance of robust security measures.

Security Recommendations #

Given the stealthy nature of sedexp, it is essential for Linux users—especially organizations—to remain vigilant. Researchers strongly advise conducting regular forensic reviews of potentially compromised servers. Deploying adequate security measures, such as updated intrusion detection systems and consistent monitoring, can help prevent such threats from infiltrating and compromising critical systems.

In summary, the discovery of sedexp underscores the importance of proactive cybersecurity measures on Linux systems. Organizations should prioritize regular system scans and stay informed about emerging threats to safeguard their networks from persistent and undetected malware like sedexp.

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on September 2, 2024
Advanced Linux Persistence Techniques: Elastic Security’s InsightsMinimal Linux Runs on Raspberry Pi’s RP2350 Microcontroller

Powered by BetterDocs

Table of Contents
  • How Sedexp Exploits udev Rules
  • Key Functions of Sedexp Malware
  • Technical Analysis and Threat Implications
  • Security Recommendations

The last technical support you will ever need!

select one of our plans and start building the most wanted app/website available today. We make sure every aspect of the server maintenance are handled with  a level of expertise needed for growing your business!

Copyright 2025 techprovidence