#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

37 C
Dubai
Thursday, July 3, 2025
HomeTopics 1Advanced Persistent ThreatLinux Beware: Magnet Goblin Deploys New NerbianRAT Variant

Linux Beware: Magnet Goblin Deploys New NerbianRAT Variant

Date:

Related stories

CVE‑2025‑20309: Cisco Unified CM Exposes Root via Static SSH Credentials

Cisco disclosed a 10.0 CVSS-critical vulnerability (CVE‑2025‑20309) in its...

PDFs: Portable Documents or Perfect Phishing Vectors?

Cybersecurity professionals are sounding the alarm: PDF attachments are...

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...
spot_imgspot_imgspot_imgspot_img

The financially motivated threat actor group, Magnet Goblin, has once again made headlines by deploying a new Linux variant of their custom malware, NerbianRAT.

This incident highlights the evolving tactics of cybercriminals and the need for robust security practices on all operating systems, not just Windows.

Magnet Goblin: A Persistent Threat

Magnet Goblin has been active since at least 2022, targeting public-facing services with a focus on exploiting one-day vulnerabilities. This latest development demonstrates their ability to adapt their malware for different operating systems, potentially expanding their attack surface.

NerbianRAT: A Multi-Faceted Threat

The new Linux variant of NerbianRAT possesses functionalities similar to its Windows counterpart, allowing attackers to:

  • Gather System Information: Collect details about the infected system, such as username, hostname, and machine information.
  • Generate Bot IDs: Assign unique identifiers to compromised machines for tracking and control purposes.
  • Establish Persistence: Configure the malware to automatically run upon system restarts, ensuring continued access for the attackers.
  • Execute Commands: Remotely execute commands on the infected system, granting attackers significant control.
  • Communicate via Raw TCP Sockets: Establish communication channels with the attacker’s command-and-control server for further instructions and data exfiltration.

The use of raw TCP sockets suggests a focus on stealth, potentially making detection more challenging for traditional security solutions.

10 Security Measures to Fortify Your Linux Systems

While this recent attack targeted public-facing servers, any Linux system can be vulnerable. Here’s how to strengthen your defenses:

  1. Patch Management: Prioritize timely installation of security updates for your Linux distribution, kernel, and applications.
  2. Strong Passwords & MFA: Implement strong and unique passwords for all accounts and enable Multi-Factor Authentication (MFA) where available.
  3. Limit User Privileges: Assign users the least privileges necessary for their tasks, minimizing the potential damage from compromised accounts.
  4. Firewall Configuration: Configure your firewall to restrict inbound and outbound traffic, limiting access only to authorized services and ports.
  5. Security Software: Consider implementing endpoint security solutions specifically designed to detect and prevent malware infections on Linux systems.
  6. Intrusion Detection/Prevention Systems (IDS/IPS): Deploy intrusion detection or prevention systems to monitor network activity and identify suspicious behavior.
  7. Vulnerability Scanning: Regularly conduct vulnerability scans to identify potential weaknesses in your system and applications.
  8. Monitor System Logs: Regularly review system logs for any unusual activity that might indicate unauthorized access attempts.
  9. Secure Coding Practices: If developing custom applications, employ secure coding practices to minimize vulnerabilities.
  10. Stay Informed: Remain updated on the latest cybersecurity threats and vulnerabilities impacting Linux systems.

Conclusion

The Magnet Goblin attack using the new NerbianRAT variant underscores the expanding threat landscape across all operating systems. By adopting a layered security approach, staying vigilant, and keeping systems updated, Linux users can significantly reduce the risk of falling victim to cyberattacks. Remember, cybersecurity is an ongoing process, and collective vigilance is key to safeguarding our digital infrastructure.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here