Skip to main content
Skip to main content
Published Aug 16, 2020 | Updated May 09, 2022

Trojan:Linux/Xorddos

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Microsoft Defender Antivirus detects and removes this threat. 

This threat is a Linux trojan primarily known for denial-of-service (DoS) attacks on Linux endpoints and servers. Attackers gain access to the target device and deploy the payload from a remote location. 

XorDdos uses XOR-based encryption to communicate with the attacker’s command-and-control (C2) servers. It steals sensitive data, downloads malicious files, installs rootkit devices, maintains persistence, and launches distributed denial-of-service (DDoS) attacks with botnet capabilities.

Read the following blog for more information:

Microsoft Defender Antivirus automatically removes threats as they are detected. If you have cloud-delivered protection, your device gets the latest defenses against new and unknown threats. If you don't have this feature enabled, update your antimalware definitions and run a full scan to remove this threat.

To help reduce the impact of this threat, you can:

  1. Isolate the affected devices and perform an investigation to see which credentials were used to launch the process.
  2. Since the attacker frequently enters via SSH brute-force, ensure internet-facing systems are hardened and have strong and randomized local admin passwords.
  3. Check RDP settings and registry keys on systems to ensure they have not been changed by the attack to maintain persistence.
  4. Investigate credential exposure on devices used by the attacker to ensure all accounts that could have been compromised by the attacker are known.
  5. Search for additional malware backdoors such as reverse proxies on systems accessed by the attacker.
  6. Microsoft Premier Support can assist and advise during investigation.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us