Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)

0
Medium
Vulnerabilityrce
Published: Fri Mar 20 2026 (03/20/2026, 08:40:15 UTC)
Source: SANS ISC Handlers Diary

Description

A malicious Bash script installs a GSocket backdoor on UNIX-like systems, including Linux and macOS, enabling stealthy remote access via a peer-to-peer relay network. The backdoor uses gs-netcat for command and control, bypassing traditional network security by connecting outbound to a global relay. Persistence is achieved through cron jobs and modifications to user profiles, while anti-forensic techniques manipulate file timestamps to hide changes. The malware is not obfuscated and includes comments, suggesting possible testing by the developer. It leverages a shared secret for communication, complicating detection. Although the infection vector is unknown, the script’s broad compatibility and stealth features pose a medium risk. Detection by antivirus is limited, with only 17 solutions identifying the sample. Organizations running UNIX-based systems should be vigilant for signs of this backdoor and implement targeted defenses.

AI-Powered Analysis

AILast updated: 03/20/2026, 08:53:43 UTC

Technical Analysis

The discovered threat is a malicious Bash script that installs a GSocket backdoor on victim machines running UNIX-like operating systems, including Linux, macOS, FreeBSD, and OpenBSD. GSocket is a networking tool designed for peer-to-peer communication using a shared secret and a global relay network, allowing connections without exposing IP addresses or open ports. The backdoor leverages gs-netcat, a GSocket-based utility, to provide remote shell access, file transfer, and tunneling capabilities, effectively bypassing traditional network security controls such as firewalls and intrusion detection systems. The script implements persistence by creating a cron job that kills and restarts the disguised gs-netcat process every hour and by injecting code into the victim’s shell profile (.profile) to ensure execution on login. The malware copies itself into the victim’s .ssh directory under the name 'putty' and stores the GSocket shared secret in a file masquerading as an SSH key, enhancing stealth. A notable anti-forensic technique involves wrapping file operations (e.g., creating, deleting, moving files) in helper functions that track and restore original file timestamps, thereby hiding filesystem modifications from forensic analysis. The script is not obfuscated and contains comments, indicating it might have been uploaded publicly for testing or demonstration. Detection is limited, with only 17 antivirus engines on VirusTotal flagging the sample. The infection vector and initial delivery method remain unknown, complicating prevention efforts. Due to its reliance on Bash scripting and standard UNIX utilities, the malware is highly portable across UNIX-like platforms. This threat represents a sophisticated, stealthy backdoor capable of persistent remote access and evasion of conventional security measures.

Potential Impact

This backdoor enables attackers to gain persistent, stealthy remote access to compromised UNIX-like systems, potentially allowing full control over affected hosts. The use of GSocket’s relay infrastructure bypasses traditional network defenses, making detection and blocking difficult. Attackers can execute arbitrary commands, transfer files, and tunnel traffic, facilitating lateral movement, data exfiltration, and further compromise within organizational networks. The anti-forensic timestamp restoration complicates incident response and forensic investigations, increasing the difficulty of detecting and attributing the intrusion. Organizations relying on UNIX-based servers, workstations, or infrastructure components are at risk, especially if they lack robust endpoint monitoring or network anomaly detection tuned for such covert channels. The unknown infection vector and limited antivirus detection increase the likelihood of undetected spread. The medium severity reflects the significant impact on confidentiality and integrity, combined with moderate ease of exploitation due to the unknown delivery method.

Mitigation Recommendations

Organizations should implement targeted detection for GSocket-related network traffic, including monitoring outbound connections to known GSocket relay IPs and unusual peer-to-peer communication patterns. Endpoint detection and response (EDR) solutions should be configured to identify the presence of gs-netcat binaries, especially those located in unusual directories like .ssh/putty, and monitor for suspicious cron jobs or modifications to user shell profiles. File integrity monitoring should be enhanced to detect timestamp anomalies and unexpected file creations or modifications, leveraging the knowledge of the malware’s timestamp restoration techniques. Restrict execution of unauthorized Bash scripts and enforce strict application whitelisting policies. Network segmentation and egress filtering can limit outbound connections to unapproved destinations, reducing the effectiveness of the relay infrastructure. Regularly audit user cron jobs and shell profiles for unauthorized changes. Since the infection vector is unknown, user education on phishing and safe script execution practices remains important. Incident response teams should prepare to analyze timestamp manipulation techniques and consider behavioral indicators beyond signature-based detection. Finally, collaborate with threat intelligence sources to update detection rules as more information becomes available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32816","fetched":true,"fetchedAt":"2026-03-20T08:53:28.780Z","wordCount":891}

Threat ID: 69bd0b08e32a4fbe5f491c53

Added to database: 3/20/2026, 8:53:28 AM

Last enriched: 3/20/2026, 8:53:43 AM

Last updated: 3/20/2026, 11:09:57 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses