#rootkits

2026-02-16

Как работают руткиты и можно ли им противодействовать на примере Singularity

Всем привет. Экспрементируя со способами закрепления на Linux системах в рамках разработки своей системы мониторига безопасности, я наткнулся на руткит с открытым исходным кодом Singularity . Он показался мне очень интересным, так как использует большое количество методов для сокрытия себя от обнаружения, а открытый исходный исходный код позволяет досконально изучить эти методы. В данной статье я подробно расскажу вам, с помощью каких подходов руткиты закрепляются на Linux системах на примере Singularity.

habr.com/ru/articles/996568/

#rootkit #rootkits #руткиты #руткит #ядро_linux #мониторинг #ebpf #обнаружение_атак #информационная_безопасность #защита_сервера

Kevin Karhan :verified:kkarhan@infosec.space
2025-11-17

@emilyyoung @ShadSterling nodds in agreement

From experience the most problematic are early #Windows games from 1995-2005 with like very old DirectX versions or cursed setups where the game is #32bit but the #Installer is #16bit. (i.e. #PizzaSyndicate).

  • Granted those games won't even install on #64bit - Windows machines anyway so they ain't smooth at all.

And whilst dedicated folks like @fuchsiii work on fixing these issues, we can all agree that people who play #Games that old may already have some dedicaded, legacy hardware at their disposal and wouldn't mind stuff like virtualization with passthrough to old PCI(e)-GPUs for their singleplayer games.

  • Obviously I'd prefer more #native #Linux #games but unless they want to statically compile the game with all dependencies into one AppImage that's more daunting as #ProtonGE / #DXVK support.

Still, #LinuxGaming has come a long way since the days when I had to manually shove DirectX, .net Runtime, ms-corefonts and Gecko (as Internet Explorer replacement) into Wine and manually force Windows-#Steam to launch...

Kevin Karhan :verified:kkarhan@infosec.space
2025-11-15

@emilyyoung precisely that because #Linux will win longterm just by not #Enshittifying and just treating users better

  • This isn't even like a hypothetical…

Also #LinuxGaming these days is easier, faster, less stressful and just overall better not just because #Valve actually cares, but because #developers and #maintainers of distros and the Linux community do.

  • The only painpoints are some quirky games released ca. 1995-2005 that didn't see widespread popularity and need tweaks in #Wine & #DXVK to run at all (as @fuchsiii is dabbling with those) and #malware-laced crap under false pretenses like "#ClientSideAnticheat" that is specifically designed to not work on #Linux with #rootkits not dissimilar from #StarFORCE!

youtube.com/watch?v=p-wyIalhdPU video via #MVG

2025-10-21

"#Hackers Deploy #Linux #Rootkits via #Cisco #SNMP Flaw in 'Zero Disco' Attacks"

thehackernews.com/2025/10/hack

In all my years in cybersecurity, I've always felt SNMP was not a good idea & should be turned off.
I know many network admins will dislike me saying that but I always turn it off.
Even the version with tacked on security #SNMPv3 has had #Vulnerabilities & many places run older SNMP & not v3.
I feel maybe it's time for something new.

#CyberSecurityNews #CyberSecurity #TechNews #Networking

A hyper‑realistic CGI render of a Cisco network switch in a dark server room. The switch rests on a reflective black surface, its metallic chassis glowing with cool blue LEDs. One Ethernet port is corrupted, spilling a thick, molten red ooze that drips down and pools below, casting a fiery glow across the front panel. Subtle glowing cracks radiate outward from the infected port. Above it, a cyan holographic projection displays “CVE‑2025‑20352” inside a futuristic circular HUD with concentric rings and scan‑line shimmer. The background shows blurred racks and faint blue ambient light, contrasting sharply with the vivid red infection.
cathillcathill
2025-10-05
∂𑁨í 🕊 d2i@mk.phreedom.club
2025-10-01

#ghostscan
A modern, Rust-powered
#Linux #scanner that unmasks hidden #rootkits, stealthy #eBPF tricks, and ghost processes in one fast sweep (45+ scanners)
https://github.com/h2337/ghostscan

Kevin Karhan :verified:kkarhan@infosec.space
2025-09-17

@technadu After #CrowdStroke it should be clear that #CrowdStrike isn't a "trustworthy brand"...

  • Granted everyone who thinks 3rd party #rootkits like CrowdStrike in a #CCSS #Govware masquerading as an #OS (#windows) is a valid security strategy should not be trusted even with a light switch or plastic fork.

also #npm sucks!

EuskalHackeuskalhack
2025-06-20

¡No parpadees si no te lo quieres perder! Stephan Berger nos habla de "In-Depth Study Of Linux Rootkits: Evolution, Detection, And Defense"   @malmoeb

EuskalHackeuskalhack
2025-06-20

¡No parpadees si no te lo quieres perder! Stephan Berger nos habla de "In-Depth Study Of Linux Rootkits: Evolution, Detection, And Defense"   @malmoeb

2025-06-04
Verfassungklage@troet.cafeVerfassungklage@troet.cafe
2025-04-25

Unsichtbare #Rootkits:

"Blinder Fleck" bei #Kernel-Interface bedroht #Linux-Systeme.

Viele #Sicherheitstools überwachen System-Calls, um #Malware zu erkennen. Unter #Linux gibt es jedoch eine Alternative, die oft völlig missachtet wird.

#Forscher von #Armo haben ein #Sicherheitsproblem in Verbindung mit einer io_uring genannten Schnittstelle des #Linux-Kernels aufgedeckt.

golem.de/news/unsichtbare-root

Schneier on Security RSSSchneier_rss@burn.capital
2025-04-24

New Linux Rootkit

Interesting:
The company has released a working rootkit called “Curing” that uses io_uring, a feature built into t... schneier.com/blog/archives/202

#Uncategorized #rootkits #Linux

⚠️ It may seem that #rootkits golden age has passed, but they are still present and dangerous.
Keep in mind what they are and how not to let them into your system.
🎯 Learn more & collect #IOCs: any.run/malware-trends/rootkit

#infosec #cybersecurity

Rene Robichaudnerowild
2025-01-14
🤍🌈Anonymous Fenix❤️‍🔥🏴‍☠️anonfenix@kolektiva.social
2025-01-08

#Anonymous #RootKits #CyberHunters #L3G10N #OpVenezuela re-engage...! Lets goo #AnonFamily #ShareIt .! Vamos por ti maduro dictador! 🔥🔥🔥🏴‍☠️⚡💜

Kevin Karhan :verified:kkarhan@infosec.space
2024-08-08

@marcel @Kensan @adfichter die einzig wirksame #Konsequenz ist, sich konsequent entsprechender #Govware als #Betriebssystem zu verweigern und keine #Scareware mit #Rootkits zu nutzen!

  • Die #Sicherheit sollte im Zweifelsfalle durch den #Maintainer des Betriebssystems / der Distribution bereitgestellt und verifizierbar sein, und wenn jene*r keine Haftung dafür anbietet so ist diese dafür zu disqualifizieren.

So einfach ist das!

Steven Saus [he/him]StevenSaus@faithcollapsing.com
2024-07-31

From 25 Jul: Secure Boot is completely broken on 200+ models from 5 big device makers - Enlargesasha85ru Getty Imates In 2012, an industry-wide coalition of hardware... arstechnica.com/security/2024/ #biz-&-it #cryptography #features #key-compromise #rootkits #secure-boot #security #supply-chain #uefi #unified-extensible-firmware-interface

Kevin Karhan :verified:kkarhan@infosec.space
2024-07-29

@theregister that's not enough!

#Microsoft must #ban #Rootkits / #Bootkits and #Lernel-level #drivers entirely or #Windows will get banned amidst it's unfixable security!

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst