HomeVulnerabilityPUMA creeps by way of Linux with a stealthy rootkit assault

PUMA creeps by way of Linux with a stealthy rootkit assault

The dropper creates two in-memory executables: /memfd:tgt, a innocent cron binary, and /memfd:wpn, a rootkit loader. The loader evaluates the surroundings, executes extra payloads, and prepares the system for rootkit deployment.

A short lived script, script.sh, is executed from /tmp to finalize the deployment of the PUMA kernel rootkit module. The rootkit embeds Kitsune SO to facilitate userland interactions, guaranteeing a seamless and stealthy an infection course of.

The kernel module’s essential options embody elevating privileges, hiding recordsdata and directories, evading detection by system instruments, implementing anti-debugging strategies, and enabling communication with command-and-control (C2) servers, the researchers added.

See also  EchoMark releases watermarking answer to safe non-public communications, detect insider threats
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular