Hackers Launch Rust-Based Luca Stealer Targeting Linux and Windows

Hackers Launch Rust-Based Luca Stealer Targeting Linux and Windows

Cybercriminals are increasingly abandoning traditional programming languages like C and C++ in favor of modern alternatives such as Rust, Golang, and Nim.

This strategic shift enables threat actors to write malicious code once and compile it for both Windows and Linux with minimal changes.

Leading this trend is “Luca Stealer,” a newly identified information-stealing malware built entirely in Rust and released publicly as open-source code.

The Rise of Rust-Based Threats

While malware written in Golang has become relatively common, Rust adoption is still in its early stages but growing rapidly.

Luca Stealer marks a significant milestone in this evolution, joining other notable Rust-based threats such as the BlackCat ransomware.

built binary can be opened in a disassembler

The public availability of Luca Stealer’s source code serves as a blueprint for less experienced cybercriminals, allowing them to study how Rust can be weaponized.

This open-source model accelerates the development of new malware variants, forcing security defenders to adapt their analysis techniques to detect these cross-platform threats rapidly.

leak the username of the user who compiled the program depending on where on disk the program was compiled
leak the username of the user who compiled the program depending on where on disk the program was compiled

Analyzing Rust malware presents unique challenges for security researchers. Unlike standard programs, Rust binaries handle text strings differently, often lacking the “null terminators” that usually mark the end of a sentence in computer code.

According to Binary Defence, this causes analysis tools to misinterpret data, resulting in overlapping text and garbled output.

Furthermore, the Rust compiler organizes code in complex ways, making it challenging to locate the malicious program’s main entry point.

Researchers have found that identifying specific internal functions, such as std::rt::lang_start_internal, is now critical for successfully analyzing the malware’s core behavior.

Despite these defensive hurdles, Rust malware leaves behind distinct digital fingerprints that researchers can leverage. The Rust build system, known as “Cargo,” manages external software libraries called “crates.”

Running the “RustDependencyStrings.py” script against the binary reveals the crates
Running the “RustDependencyStrings.py” script against the binary reveals the crates

When malware is compiled, evidence of these crates is often embedded directly into the final file.

By examining these embedded text strings, analysts can identify precisely which third-party libraries the malware uses.

For instance, the presence of the reqwest crate indicates that the malware can make HTTP requests to steal data.

Additionally, careless developers often leave behind “PDB paths” file locations from their own computers that get saved into the malware during the build process.

These paths can reveal the attacker’s username and the directory structure of their development machine.

In a recent analysis of an unknown Rust sample, researchers used these indicators to map out the malware’s capabilities and trace its origins, proving that while Rust malware is sophisticated, it is not invisible.

Indicators of Compromise (IoC)

Indicator Type Value Description
SHA256 8f47d1e39242ee4b528fcb6eb1a89983c27854bac57bc4a15597b37b7edf34a6 Rust-based malware sample hash
Crate Dependency reqwest Library used for HTTP network requests
Crate Dependency base64 Library used for data encoding
File Path librarystdsrcsyswindowsstdio.rs Internal Rust library path observed in analysis

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link