Noodle RAT: The New Stealthy Cross-Platform Malware Targeting Windows and Linux
See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses
The Linux counterpart of Noodle RAT has been used by cybercrime and espionage clusters linked to China, including Rocke and Cloud Snooper. This version can launch reverse shells, download and upload files, schedule executions, and initiate SOCKS tunneling. These attacks typically exploit known security flaws in public-facing applications to breach Linux servers and deploy web shells for remote access and malware delivery.
Despite the differences in backdoor commands, both versions share identical code for command-and-control (C2) communications and use similar configuration formats. Analysis of Noodle RAT artifacts shows that while it reuses plugins from Gh0st RAT and shares some code with Rekoobe, it remains a novel threat.
Trend Micro researchers also accessed a control panel and builder for Noodle RAT’s Linux variant. Release notes written in Simplified Chinese detailed bug fixes and improvements, suggesting that the malware is developed, maintained, and sold to specific customers. This aligns with the findings from the I-Soon leaks, which revealed a significant hack-for-hire industry in China, connecting private sector firms with state-sponsored cyber actors.
Trending: Offensive Security Tool: PingRAT
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Source: thehackernews.com