Researchers uncover ShadowHS Linux exploitation framework

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Cyble Research and Intelligence Labs (CRIL) announced the discovery of ShadowHS on January 30, 2026. This post-exploitation framework targets Linux environments, operating entirely in memory to avoid leaving traces on disk. Unlike conventional malware, ShadowHS uses an encrypted shell loader that deploys a modified hackshell, decrypted with AES-256-CBC encryption, Perl byte skipping, and gzip decompression. The payload runs through /proc//fd/ with a spoofed argv[0], ensuring no filesystem artifacts.

Once deployed, ShadowHS focuses on initial reconnaissance, including fingerprinting host security tools like CrowdStrike, Tanium, Sophos, and Microsoft Defender, as well as cloud and OT/ICS agents. It assesses prior compromises and kernel integrity to help operators evaluate the system's security posture. CRIL describes the framework as operator-centric, with restrained runtime behavior that allows selective activation of capabilities such as credential access, lateral movement, privilege escalation, cryptomining, and data exfiltration.

“ShadowHS demonstrates a clear separation between restrained runtime activity and extensive dormant capabilities,” CRIL notes. “This is indicative of a deliberate operator-driven post-exploitation platform rather than automated malware.”

For data exfiltration, ShadowHS employs user-space tunneling over GSocket, bypassing standard network channels and firewalls. Variants include DBus-based and netcat-style tunnels, which maintain file timestamps, permissions, and partial transfer states. Dormant modules cover memory dumping for credentials, SSH-based movement with brute-force scanning, kernel exploits for escalation, and mining via XMRig, GMiner, and lolMiner. It also includes anti-competition measures to terminate rivals like Rondo, Kinsing, and Ebury backdoors.

The framework highlights vulnerabilities in Linux defenses, where traditional antivirus fails against in-memory threats. CRIL emphasizes the need for process behavior monitoring, kernel telemetry, and proactive intelligence to counter such adaptive tools.

“ShadowHS represents a fully operator-controlled, adaptive Linux framework designed for stealth and long-term access,” CRIL stated.

This discovery underscores evolving threats to Linux systems, particularly in enterprise and critical infrastructure settings.

Related Articles

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Image generated by AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Reported by AI Image generated by AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Reported by AI

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Developers of the gacha RPG Duet Night Abyss have apologized for a cybersecurity incident that distributed malware to players' PCs via a launcher update on March 18. The malware, identified as Trojan:MSIL/UmbralStealer.DG!MTB, targets passwords and cryptocurrency. Players receive in-game compensation as the team implements security enhancements.

Reported by AI

NVIDIA engineer Sasha Levin has proposed a new mechanism for the Linux kernel that would let administrators quickly disable flawed functions on live systems. The patch, called killswitch, aims to mitigate privilege escalation risks without waiting for full fixes. It remains under review on the Linux Kernel Mailing List.

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline