A long-theorized attack vector has now been seen in the wild. The Microsoft Windows Subsystem for Linux (WSL) is a feature in Microsoft Windows allowing a Linux image to run without the use of a Virtual Machine. While this is a very useful feature for researchers, developers, and hobbyists, it is also a ripe environment for malware developers to attempt compromise of both environments. Researchers retrieved recent samples written in Python that creates an Executable and Linkable Format (ELF) file to inject into a running process using Windows API calls. Using this attack vector has provided the threat actor with a stealthy and next to, or actual, 0 detection rate on VirusTotal.
Researchers at BlackLotus explain, “Thus far, we have identified a limited number of samples with only one publicly routable IP address, indicating that this activity is quite limited in scope or potentially still in development…”. At this point in time, this attack vector is thought of as a tactic in development and not a widespread threat.