GBHackers

OrBit Rootkit Targets Linux to Steal SSH and Sudo Credentials


Hackers are continuing to abuse a stealthy Linux rootkit known as OrBit to harvest SSH and sudo credentials, with new research showing the threat has quietly evolved over four years while remaining active in the wild.

First analyzed in 2022, OrBit was initially believed to be a custom-built Linux userland rootkit. It operates by hijacking the system’s dynamic linker (ld.so), ensuring a malicious shared library is loaded into every running process.

This allows attackers to intercept authentication flows, capture credentials, and hide their presence from administrators.

According to intezer report, reveals that OrBit is not a unique creation. Instead, it is a repackaged version of Medusa, an open-source LD_PRELOAD rootkit published on GitHub in late 2022.

Rather than developing new malware, threat actors have been modifying and redeploying this publicly available codebase with different configurations, credentials, and stealth techniques.

Once deployed, OrBit acts as a passive implant. It does not rely on traditional command-and-control communication. Instead, attackers access compromised systems through a hidden SSH backdoor.

Meanwhile, the rootkit hooks into Pluggable Authentication Modules (PAM) to silently capture usernames and passwords from SSH logins and sudo activity storing them locally in hidden directories such as /lib/libseconf/.

OrBit Rootkit Targets Linux

The malware’s stealth capabilities are particularly advanced. By hooking more than 40 libc functions, OrBit can hide files, processes, and network connections, effectively making infected systems appear clean even under inspection.

Researchers tracking samples from 2022 to 2026 identified two main variants. The first, called Lineage A, is a full-featured build that includes credential harvesting, network hiding, packet capture, and backdoor access.

The second, Lineage B, is a lighter version that removes several capabilities, likely to reduce its footprint and avoid detection. Notably, Lineage B samples often lack embedded passwords, suggesting alternative authentication methods.

Over time, attackers have not significantly changed the core code. Instead, they have rotated credentials, modified installation paths, and adjusted features.

For example, newer variants introduced compatibility fixes like a custom “xread” function to prevent system instability that could reveal the rootkit.

Later versions also added audit log evasion and, in 2025, a more advanced PAM hook that allows attackers to manipulate authentication outcomes, not just observe them.

A major shift occurred in 2025 when operators introduced a multi-stage infection chain. This included a dropper and an infector capable of spreading the malware across systems and establishing persistence via cron jobs.

Unlike earlier versions, this variant introduced limited external communication by downloading payloads from a remote domain, marking the first time OrBit showed command-and-control-like behavior.

Infrastructure linked to this campaign overlaps with older malware activity, including the RHOMBUS botnet, though attribution remains uncertain.

At the same time, multiple threat groups have been observed using OrBit, including the ransomware-linked BLOCKADE SPIDER and the state-backed UNC3886 espionage group.

This widespread adoption highlights a key shift in the threat landscape. OrBit is no longer tied to a single actor but has become a shared toolkit used by multiple groups for persistence and credential theft across Linux environments, including critical infrastructure and virtualized systems.

Security experts warn that defenders should focus less on attributing attacks to a specific group and more on detecting the underlying behaviors of the Medusa-based rootkit.

Its consistent build patterns, hidden filesystem artifacts, and credential harvesting techniques remain reliable indicators of compromise, even as attackers continue to modify superficial elements like paths and passwords.

IOCs

SHA256YearRoleLineage
40b5127c8cf9d6bec4dbeb61ba766a95c7b2d0cafafcb82ede5a3a679a3e30202022payloadA
ec7462c3f4a87430eb19d16cfd775c173f4ba60d2f43697743db991c3d1c30672022payloadA
f1612924814ac73339f777b48b0de28b716d606e142d4d3f4308ec648e3f56c82022dropper
d419a9b17f7b4c23fd4e80a9bce130d2a13c307fccc4bfbc4d49f6b770d06d3b2023payloadA
296d28eb7b66aa2cbea7d9c2e7dc1ad6ce6f97d44d34139760c38817aec083e72023payloadA
3ba6c174a72e4bf5a10c8aaadab2c4b98702ee2308438e94a5512b69df998d5a2023payloadB
4203271c1a0c24443b7e85cbf066c9928fcc69934772a431d779017fb85c9d732023payloadB
eea274eddd712fe0b4434dbef6a2a92810cb13b8be3deca0571410ee78d37c9f2024payloadA
a61386384173b352e3bd90dcef4c7268a73cd29f6ae343c15b92070b1354a3492024payloadA
a34299a16cf30dac1096c1d24188c72eed1f9d320b1585fe0de4692472e3d4dc2024payloadB
b1dd18a6a4b0c6e2589312bbec55b392a20a95824ffe630a73c94d24504c553d2024payloadB
989f7eb4f805591839bcbc321dd44418eb5694d1342e37b7f24126817f10e37e2024payload (extracted)B
8ea420d9aa341ba23cdea0ac03951bce866c933ba297268bc7db8a01ce8e9b8e2024payload (static ELF)A
26082cd36fdaf76ec0d74b7fbf455418c49fbab64b20892a873c415c3bb606752024loader
48a68d0555f850c36f7d338b1a42ed1a661043cacf2ba2a4b0a347fac3cb3ee62024dropper
fc2e0cb627a00d0e4509bd319271721ea74fb11150847213abe9e8fea060cc8a2024dropper
8e83cbb2ed12faba9b452ea41291bcebdce08162f64ac9a5f82592df62f476132025payloadA
2b2eeb2271c19e2097a0ef0d90b2b615c20f726590bbfee139403db1dced5b0a2025payloadA
84828f31d741f92ce4bca98cfc2148ff8cff6663e2908a025b1386dd4953ffef2025payload (truncated)A
090b15fd8912cab340b22e715d44db079ec641db5e2f92916aa1f2bc9236e03e2025dropper
64a3ebd3ad3927fc783f6ac020d5a6192e9778fb16b51cceba06e4ee5416adff2025dropper
b85ed15756568b85148c1d432a8920f81e4b21f2bc38f0cf51d06ced619e0e772025dropper
d3d204c19d93e5e37697c7f80dd0de9f76a2fb4517ced9cafd7d7d46a6e285ba2025dropper
73b95b7d1006caf8d3477e4a9a0994eaa469e98b70b8c198a82c4a12c91ad49a2025infector
04c06be0f65d3ead95f3d3dd26fe150270ac8b58890e35515f9317fc7c7723c92026payloadA
d7b487d2e840c4546661f497af0195614fc0906c03d187dc39815c811ea5ec3f2026payloadA
b982276458a85cd3dd7c8aa6cb4bbb2d4885b385053f92395a99abbfb0e437842020RHOMBUS dropper

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link