Press ESC to close

New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

Category Details
Threat Actors No attribution to any known threat actor or group.
Campaign Overview Discovery of PUMAKIT, a sophisticated Linux rootkit capable of privilege escalation, stealth operations, and evasion.
Target Regions Not specified; targets Linux-based systems.
Methodology Multi-stage deployment, memory-resident execution, syscall hooking, kernel function modification.
Product Targeted Linux systems (specific focus on Ubuntu Linux Cron binary).
Malware Reference PUMAKIT, Kitsune (userland rootkit “lib64/libs.so”).
Tools Used ftrace for syscall hooking, embedded ELF binaries, Linux kernel function alterations.
Vulnerabilities Exploited Not explicitly mentioned, but leverages kernel-level hooks and privilege escalation mechanisms.
TTPs Stealth mechanisms, privilege escalation, memory-resident infection, staged deployment, command-and-control communication.
Attribution No attribution provided; advanced and sophisticated techniques indicate potential expertise.
Recommendations Enhance detection capabilities for rootkits, monitor kernel-level activities, review secure boot and symbol checks.
Source The Hackers News 

Read full article: https://thehackernews.com/2024/12/new-linux-rootkit-pumakit-uses-advanced.html

The above summary has been generated by an AI language model

Source: TheHackersNews

Published on: December 13, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *