Researchers uncover ShadowHS Linux exploitation framework

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Cyble Research and Intelligence Labs (CRIL) announced the discovery of ShadowHS on January 30, 2026. This post-exploitation framework targets Linux environments, operating entirely in memory to avoid leaving traces on disk. Unlike conventional malware, ShadowHS uses an encrypted shell loader that deploys a modified hackshell, decrypted with AES-256-CBC encryption, Perl byte skipping, and gzip decompression. The payload runs through /proc//fd/ with a spoofed argv[0], ensuring no filesystem artifacts.

Once deployed, ShadowHS focuses on initial reconnaissance, including fingerprinting host security tools like CrowdStrike, Tanium, Sophos, and Microsoft Defender, as well as cloud and OT/ICS agents. It assesses prior compromises and kernel integrity to help operators evaluate the system's security posture. CRIL describes the framework as operator-centric, with restrained runtime behavior that allows selective activation of capabilities such as credential access, lateral movement, privilege escalation, cryptomining, and data exfiltration.

“ShadowHS demonstrates a clear separation between restrained runtime activity and extensive dormant capabilities,” CRIL notes. “This is indicative of a deliberate operator-driven post-exploitation platform rather than automated malware.”

For data exfiltration, ShadowHS employs user-space tunneling over GSocket, bypassing standard network channels and firewalls. Variants include DBus-based and netcat-style tunnels, which maintain file timestamps, permissions, and partial transfer states. Dormant modules cover memory dumping for credentials, SSH-based movement with brute-force scanning, kernel exploits for escalation, and mining via XMRig, GMiner, and lolMiner. It also includes anti-competition measures to terminate rivals like Rondo, Kinsing, and Ebury backdoors.

The framework highlights vulnerabilities in Linux defenses, where traditional antivirus fails against in-memory threats. CRIL emphasizes the need for process behavior monitoring, kernel telemetry, and proactive intelligence to counter such adaptive tools.

“ShadowHS represents a fully operator-controlled, adaptive Linux framework designed for stealth and long-term access,” CRIL stated.

This discovery underscores evolving threats to Linux systems, particularly in enterprise and critical infrastructure settings.

Verwandte Artikel

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Bild generiert von KI

Researchers discover SSHStalker botnet infecting Linux servers

Von KI berichtet Bild generiert von KI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Von KI berichtet

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Von KI berichtet

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Von KI berichtet

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen