A recent resurgence of a 20-year-old Trojan has caught the attention of cybersecurity experts, as new variants have been discovered that target Linux systems and employ deceptive tactics to evade detection.
Researchers from Palo Alto Networks identified a new Linux variant of the Bifrost (aka Bifrose) malware, a remote access Trojan (RAT) that has been active since 2004. This new variant utilizes a technique called typosquatting to impersonate a legitimate VMware domain, allowing it to operate discreetly and avoid detection. By mimicking trusted domains, the malware can gather sensitive information, such as hostname and IP address, from compromised systems.
In a troubling development, Palo Alto Networks has observed a significant increase in Bifrost Linux variants over the past few months. More than 100 instances of Bifrost samples have been detected, prompting concerns among security experts and organizations. Furthermore, there is evidence that cyberattackers are expanding the attack surface by using a malicious IP address associated with a Linux variant hosting an ARM version of Bifrost.
The introduction of an ARM version of the malware is a strategic move by cybercriminals to target devices that may not be compatible with traditional x86-based malware. As ARM-based devices become more prevalent, attackers are adapting their tactics to include ARM-based malware, making their attacks more potent and capable of reaching a wider range of targets.
Attackers typically distribute Bifrost through email attachments or malicious websites, though the initial attack vector for the new Linux variants remains undisclosed. Once deployed on a victim’s computer, Bifrost establishes communication with a command-and-control (C2) domain disguised as a legitimate VMware domain. The malware encrypts user data using RC4 encryption and sends it back to the C2 server, evading detection by adopting deceptive domain names as C2 instead of IP addresses.
To ensure successful communication, the malware attempts to contact a Taiwan-based public DNS resolver, using it to resolve the deceptive domain name. This process is crucial for Bifrost to connect to its intended destination and carry out its malicious activities undetected.
Despite its age, the Bifrost RAT continues to pose a significant threat to individuals and organizations, especially with the emergence of new variants employing typosquatting to evade detection. Tracking and combating malware like Bifrost is essential for safeguarding sensitive data and maintaining the security of computer systems. By sharing indicators of compromise and advising the use of advanced security measures, researchers aim to help enterprises protect their cloud environments from the evolving threat posed by Bifrost and similar malware strains.
In conclusion, the evolving nature of malware like Bifrost underscores the need for continuous vigilance and proactive security measures to defend against sophisticated cyber threats. Staying ahead of malicious actors and safeguarding sensitive data are crucial components of maintaining the integrity of computer systems and preventing unauthorized access and harm.

