ChamelDoH: A New Linux Malware That Uses DNS-Over-HTTPS for Remote Access

As cyber threats continue to evolve, so do the methods and techniques utilized by malicious actors. One of the latest threats discovered is a new Linux malware known as ChamelDoH. This malware has been linked to the notorious ChamelGang and employs DNS-over-HTTPS (DoH) for communication with its command-and-control (C2) infrastructure. In this article, we will explore the unique features of ChamelDoH and its impact on enterprise security.

Description of the Malware

ChamelDoH is a large C++ binary that is primarily designed for remote access to a system. Upon execution, it immediately begins to collect reconnaissance data using various system calls and compiles it into a JSON object. This information is then transmitted to the C2 infrastructure using DoH tunneling.

The use of DoH tunneling is a unique aspect of ChamelDoH. This technique allows the malware to bypass traditional security measures such as firewalls and network monitoring tools that do not inspect encrypted traffic. The encrypted data is transformed into base64 format and inserted as a subdomain. This technique resembles C2 communication through domain fronting, which is often used by advanced persistent threats (APTs) to maintain persistence and evade detection.

Unique Approach to C2 Techniques

ChamelDoH distinguishes itself through its original approach to Command and Control (C2) techniques. The malware uses AES128 encryption to secure its communication, thereby ensuring confidentiality and preventing detection by traditional security methods. This approach makes detection and analysis of the malware challenging, increasing the difficulty of identifying the source of the infection and determining the level of data compromised.

Tasks performed by the implant

Once the implant is established on a system, it can perform several types of tasks, including executing commands, downloading files, and changing working directories. This allows the attacker to maintain persistent access to the system and move laterally through the network, bypassing traditional security barriers and accessing sensitive information.

Ongoing analysis by the Stairwell Threat Research Team

As ChamelDoH is a new piece of malware, ongoing analysis is being conducted by the Stairwell Threat Research team to examine its capabilities and other tools utilized by ChamelGang. The team is working to develop detection and prevention strategies to mitigate the impact of the malware on organizations.

ChamelDoH is a new Linux malware that underscores the continued evolution of cyber threats and the need for organizations to remain vigilant in their security posture. The use of DoH tunneling and encryption techniques highlights the sophistication of the malware and the need for advanced detection strategies. Organizations should ensure that their security measures are equipped to detect and mitigate these types of threats, including the latest detection software, regular security training, and the adoption of best practices for security posture. Only through proactive efforts such as these can organizations protect themselves against the ever-evolving threat landscape.

Explore more

Agentic AI Growth Systems – Review

The persistent failure of traditional marketing automation to address fragmented consumer behavior has finally reached a breaking point, necessitating a fundamental departure from rigid logic toward autonomous intelligence. For decades, the marketing technology sector operated on the assumption that a customer journey could be mapped and controlled through a series of “if-then” sequences. However, the sheer volume of digital touchpoints

Support Employee Wellbeing by Simplifying Wellness Initiatives

The modern professional landscape is currently saturated with a dizzying array of wellness programs that often leave employees feeling more exhausted than rejuvenated by the sheer volume of choices. Many organizations have traditionally operated under the assumption that more is better, offering everything from mindfulness apps and yoga sessions to complex nutritional workshops and competitive step challenges. However, the sheer

Baby Boomers vs. Gen Z: A Comparative Analysis

The modern office is no longer a monolith of shared experiences; instead, it has become a complex ecosystem where individuals born during the post-war era collaborate daily with digital natives who have never known a world without high-speed internet. This unprecedented age diversity is the defining characteristic of the current labor market, which now features four distinct generations working side-by-side.

Workplace AI Integration – Review

Corporate executives across the globe are no longer questioning whether artificial intelligence belongs in the office but are instead scrambling to master its integration before their competitors render them obsolete. This technological shift represents more than just a software upgrade; it is a fundamental restructuring of how business logic is executed across departments. Workplace AI has transitioned from a series

Is Your CRM a System of Record or a System of Execution?

The enterprise software landscape is currently undergoing a radical transformation as businesses abandon static databases in favor of intelligent engines that can actually finish the work they track. ServiceNow Autonomous CRM serves as a primary catalyst for this change, positioning itself not merely as a repository for customer information but as an active participant in operational workflows. By integrating agentic