New stealthy Pumakit Linux Rootkit Malware spotted in the Wild.
IT-security researchers have uncovered a new Linux rootkit called PUMAKIT that comes with capabilities to escalate privileges, hide files & directories, and conceal itself from system tools, while simultaneously evading detection.
So what? That does sound like a tool for three-letter-agencies. No mention of the attack vector. How does this beast get into the system in the first place? How does the system get infected? Evil Maid? Manipulation while "checking" the device?
The company's analysis comes from artifacts uploaded to the VirusTotal malware scanning platform earlier this September.
<https://www.virustotal.com/gui/file/30b26707d5fb407ef39ebee37ded7edeea2890fb5ec1ebfa09a3b3edfc80db1f>
<https://www.virustotal.com/gui/file/71cc6a6547b5afda1844792ace7d5437d7e8d6db1ba995e1b2fb760699693f24>
Besides file hashes, Elastic Security has published a YARA rule to help Linux system administrators detect Pumakit attacks.
@Olly42
Still AFTER the infection.
How does that happen?