The multi-stage rootkit targets Linux systems, using advanced stealth techniques to escalate privileges and avoid detection.
PUMAKIT, a stealthy Linux rootkit, uses syscall hooking, memory-resident execution, and advanced privilege escalation techniques.
In computing, a loadable kernel module (LKM) is an object file that contains code to extend the running kernel, or so-called base kernel, of an operating system. LKMs are typically used to add support ...
Figure 3. Bootkitty’s welcome message Note that the BlackCat name is referenced also in the loadable kernel module described later. Despite the name, we believe there is no connection to the ...
The Linux kernel, like all kernels, manages system resources so that processes get a share of CPU time and RAM. It also ...
Bootkitty doesn’t bite… yet Security researchers say they've stumbled upon the first-ever UEFI bootkit targeting Linux, ...