Skip to content
  Thursday 4 December 2025
Trending
January 3, 2022PS5 Emulator For Windows 10/11 Download – Is It Coming for PC? August 23, 2025Cybersecurity Lead June 18, 2024Cybersecurity Sales/Systems Engineer ( Healthcare Accounts ) January 21, 2024Senior Cybersecurity Analyst March 1, 2024Cisco Releases Security Advisories for Cisco NX-OS Software December 28, 2023IT Cybersecurity Specialist October 19, 2023cybersecurity – red team lead March 6, 2025EncryptHub Unleashes Ransomware and Stealer Through Sneaky Tactics June 20, 2025<h3>Watch Out for the CyberAv3ngers!</h3> March 1, 2024The Entra ID Single Sign On Security is Haunted by Silver SAML
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  PUMAKIT: The Cutting-Edge Linux Rootkit with Unbeatable Stealth
Industry News

PUMAKIT: The Cutting-Edge Linux Rootkit with Unbeatable Stealth

SecuredyouadmSecuredyouadm—December 13, 20240
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Federal Cyber Panel Launches Investigation into Chinese Telecoms Hacking

October 28, 2024

Unlock the Secrets to Securing SaaS & Web Apps: Join Our Webinar!

March 1, 2025

White House Official Raises Concerns about AI Hazards in the 2024 Elections

January 19, 2024

AI-Generated Content Will Be Labeled by Meta Beginning in May

April 8, 2024



A new Linux rootkit named PUMAKIT has been discovered by cybersecurity researchers, equipped with capabilities to escalate privileges, hide files, and evade detection. Elastic Security Lab researchers Remco Sprooten and Ruben Groenewoud described PUMAKIT as a sophisticated loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to maintain communication with command-and-control servers.

The malware analysis was based on artifacts uploaded to the VirusTotal platform in September. PUMAKIT is built on a multi-stage architecture, including components like a dropper named “cron,” memory-resident executables, an LKM rootkit, and a shared object userland rootkit called Kitsune. It utilizes the ftrace function tracer to hook into system calls and kernel functions to manipulate core system behaviors.

The researchers highlighted unique methods used by PUMAKIT, such as leveraging the rmdir() syscall for privilege escalation and specialized commands for extracting configuration and runtime information. The rootkit ensures staged deployment, activating only under specific conditions like secure boot checks or kernel symbol availability, by scanning the Linux kernel and embedding necessary files as ELF binaries within the dropper.

The infection chain of PUMAKIT is designed to hide its presence and exploit memory-resident files and specific checks before deploying the rootkit. Despite its complexity and stealthy nature, PUMAKIT has not been linked to any specific threat actor or group. The researchers concluded that the malware’s design reflects the increasing sophistication of threats targeting Linux systems.

For more exclusive content on cybersecurity, follow The Hacker News on Twitter and LinkedIn.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Senior Cybersecurity Solutions Engineer (RapidScale)
Iran-Linked Malware Threatens SCADA and IoT Systems!
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

Advantech iView | CISA

December 4, 20250
Threat Advisories

Johnson Controls iSTAR | CISA

December 4, 20250
Careers

Senior Manager, Cybersecurity IR and SOC

December 4, 20250
Careers

Senior Manager, Cybersecurity GRC

December 4, 20250
Careers

Cybersecurity Analyst

December 4, 20250
Careers

Senior Cybersecurity – CASB Engineer

December 4, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Advantech iView | CISA
  • Johnson Controls iSTAR | CISA
  • Senior Manager, Cybersecurity IR and SOC
  • Senior Manager, Cybersecurity GRC
  • Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures