The OVERSTEP backdoor, written in C, is specifically designed for SonicWall SMA 100 series appliances. It injects itself into the memory of other processes via the /etc/ld.so.preload file and then hijacks standard file system functions such as open, open64, readdir, readdir64, and write. This allows it to hide its components on the system.
The backdoor’s main purpose is to steal passwords and provide attackers with a reverse shell on the system, through which they can execute additional shell commands.
“In our investigations, GTIG observed beaconing traffic from compromised appliances, but we did not identify notable post-compromise activities,” the researchers wrote. “The actor’s success in hiding their tracks is largely due to OVERSTEP’s capability to selectively delete log entries from httpd.log, http_request.log, and inotify.log. This anti-forensic measure, combined with a lack of shell history on disk, significantly reduces visibility into the actor’s secondary objectives.”