{"id":220770,"date":"2025-08-23T08:18:35","date_gmt":"2025-08-23T13:18:35","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/08\/linux-malware-delivered-via-malicious-rar-filenames-evades-antivirus-detection"},"modified":"2025-08-23T08:18:35","modified_gmt":"2025-08-23T13:18:35","slug":"linux-malware-delivered-via-malicious-rar-filenames-evades-antivirus-detection","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/08\/linux-malware-delivered-via-malicious-rar-filenames-evades-antivirus-detection","title":{"rendered":"Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/linux-malware-delivered-via-malicious-rar-filenames-evades-antivirus-detection2.jpg\"><\/a><\/p>\n<p>Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called <b>VShell<\/b>.<\/p>\n<p>The \u201cLinux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,\u201d Trellix researcher Sagar Bade <a href=\"https:\/\/www.trellix.com\/blogs\/research\/the-silent-fileless-threat-of-vshell\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a technical write-up.<\/p>\n<p>\u201cThe payload isn\u2019t hidden inside the file content or a macro, it\u2019s encoded directly in the filename itself. Through clever use of shell command injection and Base64-encoded Bash payloads, the attacker turns a simple file listing operation into an automatic malware execution trigger.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The \u201cLinux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,\u201d Trellix researcher Sagar Bade said in a technical write-up. \u201cThe payload isn\u2019t hidden inside the file content [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-220770","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/220770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=220770"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/220770\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=220770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=220770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=220770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}