{"id":140373,"date":"2022-06-10T20:02:55","date_gmt":"2022-06-11T01:02:55","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/06\/symbiote-a-stealthy-linux-malware-targeting-latin-american-financial-sector"},"modified":"2022-06-10T20:02:55","modified_gmt":"2022-06-11T01:02:55","slug":"symbiote-a-stealthy-linux-malware-targeting-latin-american-financial-sector","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/06\/symbiote-a-stealthy-linux-malware-targeting-latin-american-financial-sector","title":{"rendered":"Symbiote: A Stealthy Linux Malware Targeting Latin American Financial Sector"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/symbiote-a-stealthy-linux-malware-targeting-latin-american-financial-sector.jpg\"><\/a><\/p>\n<p>Cybersecurity researchers have taken the wraps off what they call a \u201cnearly-impossible-to-detect\u201d Linux malware that could be weaponized to backdoor infected systems.<\/p>\n<p>Dubbed <strong>Symbiote<\/strong> by threat intelligence firms BlackBerry and Intezer, the stealthy malware is so named for its ability to conceal itself within running processes and network traffic and drain a victim\u2019s resources like a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Symbiosis\" rel=\"noopener\" target=\"_blank\">parasite<\/a>.<\/p>\n<p>The operators behind Symbiote are believed to have commenced development on the malware in November 2021, with the threat actor predominantly using it to target the financial sector in Latin America, including banks like Banco do Brasil and Caixa, based on the domain names used.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have taken the wraps off what they call a \u201cnearly-impossible-to-detect\u201d Linux malware that could be weaponized to backdoor infected systems. Dubbed Symbiote by threat intelligence firms BlackBerry and Intezer, the stealthy malware is so named for its ability to conceal itself within running processes and network traffic and drain a victim\u2019s resources like [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,45,1512],"tags":[],"class_list":["post-140373","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-finance","category-mobile-phones"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/140373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=140373"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/140373\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=140373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=140373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=140373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}