{"id":539032,"date":"2021-09-16T08:01:10","date_gmt":"2021-09-16T12:01:10","guid":{"rendered":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/"},"modified":"2021-09-16T08:01:10","modified_gmt":"2021-09-16T12:01:10","slug":"theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders","status":"publish","type":"post","link":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/","title":{"rendered":"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders"},"content":{"rendered":"<div class=\"xn-newslines\">\n<p class=\"xn-distributor\">PR Newswire<\/p>\n<\/p><\/div>\n<div class=\"xn-content\">\n<p>\n        <span class=\"xn-location\">DENVER<\/span>, <span class=\"xn-chron\">Sept. 16, 2021<\/span> \/PRNewswire\/ &#8212; <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=296197662&amp;u=http%3A%2F%2Fwww.lumen.com%2Fblacklotuslabs&amp;a=Black+Lotus+Labs\" rel=\"nofollow noopener\">Black Lotus Labs<\/a>, the threat intelligence arm of <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=986703163&amp;u=https%3A%2F%2Fwww.lumen.com%2F&amp;a=Lumen+Technologies\" rel=\"nofollow noopener\">Lumen Technologies<\/a> (NYSE: LUMN), has <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=1862243586&amp;u=https%3A%2F%2Fblog.lumen.com%2Fno-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders&amp;a=proven\" rel=\"nofollow noopener\">proven<\/a>\u00a0what was previously just a theory: threat actors can use a Linux binary as a loader designed for Windows Subsystem for Linux (WSL) to inject malicious files into a Windows running process.<\/p>\n<div class=\"PRN_ImbeddedAssetReference\" id=\"DivAssetPlaceHolder1\">\n<p>\n          <a href=\"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.html\" target=\"_blank\" rel=\"nofollow noopener\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.jpg\" title=\"Black Lotus Labs logo (PRNewsfoto\/Lumen Technologies,Lumen Black Lotus Labs)\" alt=\"Black Lotus Labs logo (PRNewsfoto\/Lumen Technologies,Lumen Black Lotus Labs)\" \/><br \/>\n          <\/a>\n        <\/p>\n<\/p><\/div>\n<div id=\"divReleaseHighlight9485\">Black Lotus Labs proved what was previously just a theory: Linux binaries can be used as backdoors to gain access to WSL<\/div>\n<p>Back in 2017, researchers <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=3384363628&amp;u=https%3A%2F%2Fresearch.checkpoint.com%2F2017%2Fbeware-bashware-new-method-malware-bypass-security-solutions%2F&amp;a=theorized\" rel=\"nofollow noopener\">theorized<\/a> that Linux binaries could potentially be used as backdoors to gain access to WSL, but there has never been evidence of such activity in the wild until now. <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=2399524749&amp;u=https%3A%2F%2Fblog.lumen.com%2Fno-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders&amp;a=Today%27s+findings\" rel=\"nofollow noopener\">Today&#8217;s findings<\/a> from Black Lotus Labs proves that it is not only possible \u2013 it&#8217;s actually happening \u2013 and samples have been actively developed to abuse this attack surface. This could make it a threat to any machine on which the local system administrator has already installed WSL.<\/p>\n<p>&#8220;Threat actors always look for new attack surfaces,&#8221; said <span class=\"xn-person\">Mike Benjamin<\/span>, Lumen vice president of product security and head of Black Lotus Labs. &#8220;While the use of WSL is generally limited to power users, those users often have escalated privileges in an organization. This creates blind spots as the industry continues to remove barriers between operating systems.&#8221;<\/p>\n<p>\n        <b>Key Findings:<\/b>\n      <\/p>\n<ul type=\"disc\">\n<li>Black Lotus Labs discovered several malicious files that were written primarily in Python and compiled in the Linux binary format ELF (Executable and Linkable Format) for the Debian operating system. <\/li>\n<li>These files acted as loaders running a payload that was either embedded within the sample or retrieved from a remote server and then injected into a running process using Windows API calls. <\/li>\n<li>While this approach was not particularly sophisticated, the novelty of using an ELF loader designed for the WSL environment gave the technique a detection rate of one or zero in Virus Total, depending on the sample, as of the time of the report. <\/li>\n<li>Black Lotus Labs has identified a limited number of samples with only one publicly routable IP address, indicating that this activity is limited in scope \u2013 potentially still in development \u2013 and likely the first documented instance of an actor abusing WSL to install subsequent payloads. <\/li>\n<\/ul>\n<p>To combat this campaign, Black Lotus Labs null-routed the threat actor infrastructure across the Lumen global IP network. <\/p>\n<p>\n        <b>Recommendations and Resources:<\/b>\n      <\/p>\n<ul type=\"disc\">\n<li>Read the <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=530423124&amp;u=https%3A%2F%2Fblog.lumen.com%2Fno-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders&amp;a=full+Black+Lotus+Labs+blog\" rel=\"nofollow noopener\">full Black Lotus Labs blog<\/a>\u00a0to learn how to identify this tradecraft, see file hashes associated with the campaign, and view the threat actor&#8217;s larger activity cluster. <\/li>\n<li>System administrators who have enabled WSL should <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=895579380&amp;u=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Farchive%2Fblogs%2Fwsl%2Fwsl-antivirus-and-firewall-compatibility&amp;a=ensure+proper+logging\" rel=\"nofollow noopener\">ensure proper logging<\/a> to detect this type of tradecraft. <\/li>\n<li>Black Lotus Labs continues to follow this activity and encourages others to do the same. <\/li>\n<li>Anyone who sees similar activity in their environment can reach out via Twitter <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=3531838226&amp;u=https%3A%2F%2Ftwitter.com%2FBlackLotusLabs&amp;a=%40BlackLotusLabs\" rel=\"nofollow noopener\">@BlackLotusLabs<\/a>. <\/li>\n<\/ul>\n<p>\n        <b>About Lumen Technologies:<\/b>\n      <\/p>\n<p>Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With approximately 450,000 route fiber miles and serving customers in more than 60 countries, we deliver the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences. <\/p>\n<p>Learn more about the Lumen network, edge cloud, security, communication and collaboration solutions and our purpose to further human progress through technology at <a target=\"_blank\" href=\"https:\/\/c212.net\/c\/link\/?t=0&amp;l=en&amp;o=3292886-1&amp;h=3346013763&amp;u=https%3A%2F%2Fnews.lumen.com%2F&amp;a=news.lumen.com%2Fhome\" rel=\"nofollow noopener\">news.lumen.com\/home<\/a>, LinkedIn: \/lumentechnologies, Twitter: @lumentechco, Facebook: \/lumentechnologies, Instagram: @lumentechnologies and YouTube: \/lumentechnologies. Lumen and Lumen Technologies are registered trademarks in <span class=\"xn-location\">the United States<\/span>.<\/p>\n<p>\u00a0<\/p>\n<div class=\"PRN_ImbeddedAssetReference\" id=\"DivAssetPlaceHolder2\"><\/div>\n<p id=\"PURL\">\n        <img loading=\"lazy\" decoding=\"async\" title=\"Cision\" width=\"12\" height=\"12\" alt=\"Cision\" src=\"https:\/\/c212.net\/c\/img\/favicon.png?sn=LA09138&amp;sd=2021-09-16\" \/> View original content to download multimedia:<a id=\"PRNURL\" rel=\"nofollow noopener\" href=\"https:\/\/www.prnewswire.com\/news-releases\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders-301378465.html\" target=\"_blank\">https:\/\/www.prnewswire.com\/news-releases\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders-301378465.html<\/a><\/p>\n<p>SOURCE  Lumen Black Lotus Labs<\/p>\n<\/p><\/div>\n<p>    <img decoding=\"async\" alt=\"\" src=\"https:\/\/rt.prnewswire.com\/rt.gif?NewsItemId=LA09138&amp;Transmission_Id=202109160758PR_NEWS_USPR_____LA09138&amp;DateId=20210916\" style=\"border:0px;width:1px;height:1px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PR Newswire DENVER, Sept. 16, 2021 \/PRNewswire\/ &#8212; Black Lotus Labs, the threat intelligence arm of Lumen Technologies (NYSE: LUMN), has proven\u00a0what was previously just a theory: threat actors can use a Linux binary as a loader designed for Windows Subsystem for Linux (WSL) to inject malicious files into a Windows running process. Black Lotus Labs proved what was previously just a theory: Linux binaries can be used as backdoors to gain access to WSL Back in 2017, researchers theorized that Linux binaries could potentially be used as backdoors to gain access to WSL, but there has never been evidence of such activity in the wild until now. Today&#8217;s findings from Black Lotus Labs proves that it is not only &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-539032","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders - Market Newsdesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders - Market Newsdesk\" \/>\n<meta property=\"og:description\" content=\"PR Newswire DENVER, Sept. 16, 2021 \/PRNewswire\/ &#8212; Black Lotus Labs, the threat intelligence arm of Lumen Technologies (NYSE: LUMN), has proven\u00a0what was previously just a theory: threat actors can use a Linux binary as a loader designed for Windows Subsystem for Linux (WSL) to inject malicious files into a Windows running process. Black Lotus Labs proved what was previously just a theory: Linux binaries can be used as backdoors to gain access to WSL Back in 2017, researchers theorized that Linux binaries could potentially be used as backdoors to gain access to WSL, but there has never been evidence of such activity in the wild until now. Today&#8217;s findings from Black Lotus Labs proves that it is not only &hellip; Continue reading &quot;Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/\" \/>\n<meta property=\"og:site_name\" content=\"Market Newsdesk\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-16T12:01:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.jpg\" \/>\n<meta name=\"author\" content=\"Newsdesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Newsdesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/\"},\"author\":{\"name\":\"Newsdesk\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"headline\":\"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders\",\"datePublished\":\"2021-09-16T12:01:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/\"},\"wordCount\":595,\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1477896\\\/BlackLotusLabs_Logo.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/\",\"name\":\"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders - Market Newsdesk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1477896\\\/BlackLotusLabs_Logo.jpg\",\"datePublished\":\"2021-09-16T12:01:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1477896\\\/BlackLotusLabs_Logo.jpg\",\"contentUrl\":\"https:\\\/\\\/mma.prnewswire.com\\\/media\\\/1477896\\\/BlackLotusLabs_Logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#website\",\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/\",\"name\":\"Market Newsdesk\",\"description\":\"Latest Business News in Real Time\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/#\\\/schema\\\/person\\\/482f27a394d4fda80ecb5499e519d979\",\"name\":\"Newsdesk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g\",\"caption\":\"Newsdesk\"},\"url\":\"https:\\\/\\\/www.marketnewsdesk.com\\\/index.php\\\/author\\\/newsdesk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders - Market Newsdesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/","og_locale":"en_US","og_type":"article","og_title":"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders - Market Newsdesk","og_description":"PR Newswire DENVER, Sept. 16, 2021 \/PRNewswire\/ &#8212; Black Lotus Labs, the threat intelligence arm of Lumen Technologies (NYSE: LUMN), has proven\u00a0what was previously just a theory: threat actors can use a Linux binary as a loader designed for Windows Subsystem for Linux (WSL) to inject malicious files into a Windows running process. Black Lotus Labs proved what was previously just a theory: Linux binaries can be used as backdoors to gain access to WSL Back in 2017, researchers theorized that Linux binaries could potentially be used as backdoors to gain access to WSL, but there has never been evidence of such activity in the wild until now. Today&#8217;s findings from Black Lotus Labs proves that it is not only &hellip; Continue reading \"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders\"","og_url":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/","og_site_name":"Market Newsdesk","article_published_time":"2021-09-16T12:01:10+00:00","og_image":[{"url":"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.jpg","type":"","width":"","height":""}],"author":"Newsdesk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Newsdesk","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/#article","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/"},"author":{"name":"Newsdesk","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"headline":"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders","datePublished":"2021-09-16T12:01:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/"},"wordCount":595,"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/#primaryimage"},"thumbnailUrl":"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/","url":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/","name":"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders - Market Newsdesk","isPartOf":{"@id":"https:\/\/www.marketnewsdesk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/#primaryimage"},"image":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/#primaryimage"},"thumbnailUrl":"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.jpg","datePublished":"2021-09-16T12:01:10+00:00","author":{"@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979"},"breadcrumb":{"@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/#primaryimage","url":"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.jpg","contentUrl":"https:\/\/mma.prnewswire.com\/media\/1477896\/BlackLotusLabs_Logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.marketnewsdesk.com\/index.php\/theory-confirmed-lumen-black-lotus-labs-discovers-linux-executable-files-have-been-deployed-as-stealth-windows-loaders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.marketnewsdesk.com\/"},{"@type":"ListItem","position":2,"name":"Theory confirmed: Lumen Black Lotus Labs discovers Linux executable files have been deployed as stealth Windows loaders"}]},{"@type":"WebSite","@id":"https:\/\/www.marketnewsdesk.com\/#website","url":"https:\/\/www.marketnewsdesk.com\/","name":"Market Newsdesk","description":"Latest Business News in Real Time","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.marketnewsdesk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.marketnewsdesk.com\/#\/schema\/person\/482f27a394d4fda80ecb5499e519d979","name":"Newsdesk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a0d0bd5b0f0ca12a265a459b13169dac35f33776d8501eda5e68844a366f2f46?s=96&d=mm&r=g","caption":"Newsdesk"},"url":"https:\/\/www.marketnewsdesk.com\/index.php\/author\/newsdesk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/539032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/comments?post=539032"}],"version-history":[{"count":0,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/posts\/539032\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/media?parent=539032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/categories?post=539032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.marketnewsdesk.com\/index.php\/wp-json\/wp\/v2\/tags?post=539032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}