Google Risk Intelligence has unveiled a collection of refined menace looking strategies to detect malicious .desktop information, a novel assault vector leveraged by menace actors to compromise methods.
Initially documented by Zscaler researchers in 2023, this system includes the abuse of .desktop files-plain textual content configuration information used to outline utility launch conduct in Linux desktop environments-to execute malicious instructions.
A current surge of such information uploaded to Google Risk Intelligence prompted an in-depth evaluation, leading to actionable methods for figuring out and mitigating these threats.
This discovery underscores the evolving techniques of cybercriminals who obfuscate their intent with junk code and exploit reputable system processes to deploy malware, typically utilizing Google Drive-hosted PDFs as distractions whereas subsequent malicious payloads are downloaded.
A Persistent Risk to Linux Programs
The construction of .desktop information, adhering to the Desktop Entry Specification, sometimes consists of sections like [Desktop Entry] with keys comparable to Title, Remark, Exec, and Icon, making them moveable throughout Linux distributions.

Nonetheless, the malicious variants recognized by Google Risk Intelligence deviate starkly from the norm.
These information typically begin with hundreds of strains of ‘#’ characters interwoven with reputable content material to obscure their true function.
Upon execution, the ‘Exec’ variable triggers instructions which will open seemingly innocuous PDFs by way of Google Drive utilizing system utilities like xdg-open, which in flip delegates to environment-specific processes comparable to exo-open in XFCE, gio open in GNOME, or kde-open in KDE.
In Google’s sandbox evaluation Report, the method chain-xdg-open to exo-open to exo-helper-2-reveals how URLs are opened in default browsers like Firefox, whereas covert malware phases are deployed.
This intricate abuse of ordinary Linux conduct highlights the necessity for sturdy detection mechanisms, which Google Risk Intelligence addresses by way of focused queries and behavioral evaluation.
Defenders with Exact Detection Queries
To empower defenders, Google Risk Intelligence gives a number of looking queries specializing in course of behaviors and file content material.
One method targets the ultimate course of within the execution chain, exo-helper-2, by trying to find arguments like “–launch WebBrowser” alongside Google Drive URLs, which might point out suspicious exercise.
Broader queries embody processes throughout desktop environments, combining phrases like xdg-open, exo-open, and environment-specific instructions to seize URL-opening behaviors tied to malicious .desktop information.
Moreover, queries leveraging instructions executed by xdg-open, comparable to “/usr/bin/grep -i ^xfce_desktop_window” or “/usr/bin/xprop -root”, assist establish associated samples when paired with indicators like Google Drive URLs or PDF downloads.
For generic detection, trying to find the “[Desktop Entry]” string on the file’s begin or particular content material patterns like “Exec=bash -c” gives a approach to uncover potential threats, together with these performing as downloaders or loaders for additional malicious payloads like miner-related ELF information.
The next desk lists current samples uploaded in 2025, probably linked to the Zscaler-reported marketing campaign, although attribution stays unconfirmed.
Observe that the add nation doesn’t essentially point out the sufferer’s location as a consequence of attainable proxy use.
Indicators of Compromise (IoCs)
Filename | SHA1 | Add Date | Add Nation |
---|---|---|---|
Alternative for Train, Re Train of Possibility for pay Fixation.desktop | c2f0f011eabb4fae94e7a5973f1f05208e197db983a09e2f7096bcff69a794d1 | 2025-04-30 | India |
Revised SOP for Webex Assembly – MOD.desktop | 8d61ce3651eb070c8cdb76a334a16e53ad865572 | 2025-04-15 | India |
Posting, switch below Ph-III of Rotational Transfers of ASO and SSAs.desktop | eb35be47387605ba194e5422c5f1e99e6968af65 | 2025-04-09 | India |
Award Medal Declaration Type.desktop | 1814730cb451b930573c6a52f047301bff0b84d1 | 2025-04-08 | Australia |
Assist Guide for NIC & GOV E-mail ID Creation.pdf.desktop | 040711b2e577fcdba8dc130f72475935893e8471 | 2025-04-04 | India |
Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get Prompt Updates!