PUMAKIT isn’t your everyday piece of malware—it’s a cunning Linux rootkit that stays hidden in plain sight. Through a mix of memory-only binaries, loadable kernel modules, and clever syscall hooking, it achieves deep system infiltration without leaving obvious footprints behind. Unlike traditional rootkits, PUMAKIT twists even the simplest commands to its advantage, using tactics like hooking the rmdir() syscall for privilege escalation. It’s also not shy about communicating with remote command-and-control servers, ensuring it remains well-managed and flexible over time.

What makes PUMAKIT especially intriguing is its multi-stage approach. By activating only when certain conditions are met, and using a chain of carefully orchestrated executables, it reduces the odds of early detection. From disguising itself as benign processes to planting userland backdoors, it’s engineered for stealth and persistence.

In my latest in-depth analysis, I dissect PUMAKIT’s architecture, explore the ftrace-based hooking methods it relies on, and share insights into how researchers can detect its presence. I also discuss strategies to prevent this rootkit from taking hold in the first place. If you’re interested in advanced Linux threats and the inner workings of sophisticated malware, this is definitely one to check out.

Read the full article on Elastic Security Labs