Trend Micro researchers have identified a previously unknown Linux backdoor, GhostPenguin, showcasing the power of AI-driven threat hunting. The malware sample was first submitted to VirusTotal on July 7, 2025, but remained undetected by all signature-based scanners for over four months. It was discovered by an automated AI pipeline designed to find needles in a haystack of benign files. GhostPenguin is a fully-featured backdoor written in C++ that provides remote shell access, file transfer capabilities, and system reconnaissance. It employs multiple stealth techniques, including communicating over UDP port 53 (typically for DNS) and encrypting its C2 traffic with the RC5 cipher. The discovery underscores the limitations of traditional detection methods against novel threats and the increasing value of machine learning in cybersecurity.
GhostPenguin is a sophisticated backdoor designed for stealth and comprehensive control over infected Linux systems. Its key features include:
/bin/sh, allowing arbitrary command execution.65.20.72.101:53 and 124.221.109.147:5679) using UDP. The use of port 53 is a deliberate choice to blend in with legitimate DNS traffic, making it harder to spot on the network..temp file in the user's home directory containing its process ID (PID) to ensure only one instance of the backdoor runs at a time.Analysis of the malware binary revealed debug strings and unused functions, suggesting it is an active project and may be enhanced with new capabilities in the future.
GhostPenguin's TTPs map to the MITRE ATT&CK framework as follows:
T1059.004 - Unix Shell is invoked to provide the remote shell functionality.T1071.004 - Application Layer Protocol: DNS by communicating over UDP port 53. The communication is encrypted, which aligns with T1573.001 - Encrypted Channel: Symmetric Cryptography.T1082 - System Information Discovery and T1016 - System Network Configuration Discovery..temp) is a form of T1564.001 - Hidden Files and Directories.The impact of a GhostPenguin infection is severe. As a full-featured backdoor, it grants an attacker complete control over the compromised Linux server. This can lead to:
| Type | Value | Description |
|---|---|---|
ip_address_v4 |
65.20.72.101 |
C2 Server IP Address |
ip_address_v4 |
124.221.109.147 |
C2 Server IP Address |
destination_port |
53 |
C2 Port (UDP) |
destination_port |
5679 |
C2 Port (UDP) |
file_name |
.temp |
Lock file created in the user's home directory. |
D3-NTA: Network Traffic Analysis.65.20.72.101, 124.221.109.147) at the network perimeter. This is an application of D3-OTF: Outbound Traffic Filtering..temp lock file in user home directories (~/). Also, hunt for suspicious processes running from unexpected locations or processes that are holding open a UDP socket to an external IP on port 53.auditd) and network connections on Linux servers. Forward these logs to a SIEM for correlation and analysis.Implement egress filtering to block outbound traffic to the known C2 IPs and analyze UDP port 53 traffic for non-DNS patterns.
Mapped D3FEND Techniques:
Use an EDR to detect anomalous behaviors, such as a web service process spawning a shell, which is characteristic of backdoor activity.
While signature-based detection failed initially, behavioral and heuristic engines in modern EDR/AV solutions are crucial for catching such threats.
Mapped D3FEND Techniques:
To detect GhostPenguin's C2 communication, network traffic analysis is paramount. Since the malware uses UDP port 53 to masquerade as DNS, a standard port-based firewall rule is ineffective. Instead, deploy a network analysis tool like Zeek or Suricata that performs protocol validation. Configure it to alert on any traffic over UDP/53 that does not conform to the RFC standards for DNS queries and responses. GhostPenguin's RC5-encrypted, long-lived connection will not look like legitimate DNS traffic. Furthermore, create specific rules to block and alert on any outbound traffic to the known C2 IPs: 65.20.72.101 and 124.221.109.147. This network-centric approach is the most reliable way to detect this threat, as it bypasses the malware's file-based stealth.
On your Linux servers, use an EDR or auditd to monitor for anomalous process behavior. A key detection for GhostPenguin is identifying a process that is holding a persistent UDP socket open to an external IP address on port 53. Legitimate DNS resolution is transactional and does not maintain a long-lived connection. Create a detection rule that flags any process with a UDP connection on port 53 that lasts longer than a few seconds. Additionally, hunt for processes that spawn a /bin/sh shell but have no legitimate reason to do so (e.g., a web server or database process). Correlating this behavior with the creation of a hidden .temp file in a user's home directory provides a high-confidence indicator of a GhostPenguin compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats