Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure

Home/BOTNET, Exploitation, Internet Security, Linux Malware, Malware, Security Advisory, Security Update, Tips/Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure

Pumakit: Advanced Linux Rootkit Targets Critical Infrastructure

A highly sophisticated Linux rootkit, Pumakit, has been identified targeting critical infrastructure sectors like telecommunications, finance, and national security.

Discovered by Elastic Security Labs, Pumakit highlights a growing trend of advanced malware targeting Linux environments, which have typically been regarded as more secure than other operating systems.

All about Pumakit

Pumakit uses advanced evasion techniques at the kernel level, posing a serious threat to organizations using Linux systems. Its ability to remain undetected highlights the growing complexity of cyber threats.

It targets kernel-level processes to carry out malicious actions while staying hidden. It uses advanced methods to avoid detection and keep control of compromised systems.

Pumakit Infection Process

Pumakit hides its activities by manipulating kernel-level system calls, making it invisible to traditional monitoring tools.

It embeds itself in the kernel, ensuring control even after reboots, and erases logs to hide its actions. The rootkit allows attackers to steal data, maintain a backdoor, and disable security tools, making detection difficult. Organizations should monitor for signs of Pumakit infection.

Key indicators of Pumakit include unusual kernel-level modules, changes to system call handlers, and hidden files or processes. Suspicious traffic to IP 89.23.113.204 or domains like rhel.opsecurity1.art, as well as malicious file hashes (e.g., 4375998ea157a8a21e1ead13052bad8a), should raise alarms.

To mitigate Pumakit, organizations should implement strategies like blocking malicious libraries to prevent dynamic linker hijacking (T1574.006), detecting process injection (T1055), enforcing multi-factor authentication (MFA) to protect accounts (T1078.001), and restricting permissions to secure security settings against tampering (T1562.001).

Recommended Defensive Measures

System Hardening: Apply security patches and updates regularly.
Access Management: Limit admin access and enforce strict account policies.
Behavioral Monitoring: Use continuous monitoring tools to detect anomalies.
Incident Response: Have protocols in place for quick rootkit response.

Elastic Security Labs offers a YARA Rule to detect Pumakit infections by scanning for malicious strings, file artifacts, and IP addresses like “PUMA %s,” “opsecurity1.art,” and 89.23.113.204.

Pumakit highlights the risks of advanced cyber threats. Continuous monitoring and proactive strategies are vital to counter such threats.

Indicators of Compromise (IoC)

Indicator TypeDetails
Kernel-level modulesModules with unusual names or attributes
System modificationsUnexpected changes to system call handlers
Hidden assetsConcealed files, processes, or network connections
Suspicious hosts89.23.113.204 and domains like rhel.opsecurity1.art
File HashesExamples: 4375998ea157a8a21e1ead13052bad8a, 810f4b422b9c0a6718e9461de3a2edda

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

By | 2025-01-21T10:51:25+05:30 January 18th, 2025|BOTNET, Exploitation, Internet Security, Linux Malware, Malware, Security Advisory, Security Update, Tips|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!