Researchers uncover ShadowHS Linux exploitation framework

Cyble Research and Intelligence Labs has revealed ShadowHS, a sophisticated fileless framework for post-exploitation on Linux systems. The tool enables stealthy, in-memory operations and long-term access for attackers. It features a weaponized version of hackshell and advanced evasion techniques.

Cyble Research and Intelligence Labs (CRIL) announced the discovery of ShadowHS on January 30, 2026. This post-exploitation framework targets Linux environments, operating entirely in memory to avoid leaving traces on disk. Unlike conventional malware, ShadowHS uses an encrypted shell loader that deploys a modified hackshell, decrypted with AES-256-CBC encryption, Perl byte skipping, and gzip decompression. The payload runs through /proc//fd/ with a spoofed argv[0], ensuring no filesystem artifacts.

Once deployed, ShadowHS focuses on initial reconnaissance, including fingerprinting host security tools like CrowdStrike, Tanium, Sophos, and Microsoft Defender, as well as cloud and OT/ICS agents. It assesses prior compromises and kernel integrity to help operators evaluate the system's security posture. CRIL describes the framework as operator-centric, with restrained runtime behavior that allows selective activation of capabilities such as credential access, lateral movement, privilege escalation, cryptomining, and data exfiltration.

“ShadowHS demonstrates a clear separation between restrained runtime activity and extensive dormant capabilities,” CRIL notes. “This is indicative of a deliberate operator-driven post-exploitation platform rather than automated malware.”

For data exfiltration, ShadowHS employs user-space tunneling over GSocket, bypassing standard network channels and firewalls. Variants include DBus-based and netcat-style tunnels, which maintain file timestamps, permissions, and partial transfer states. Dormant modules cover memory dumping for credentials, SSH-based movement with brute-force scanning, kernel exploits for escalation, and mining via XMRig, GMiner, and lolMiner. It also includes anti-competition measures to terminate rivals like Rondo, Kinsing, and Ebury backdoors.

The framework highlights vulnerabilities in Linux defenses, where traditional antivirus fails against in-memory threats. CRIL emphasizes the need for process behavior monitoring, kernel telemetry, and proactive intelligence to counter such adaptive tools.

“ShadowHS represents a fully operator-controlled, adaptive Linux framework designed for stealth and long-term access,” CRIL stated.

This discovery underscores evolving threats to Linux systems, particularly in enterprise and critical infrastructure settings.

Makala yanayohusiana

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Picha iliyoundwa na AI

Researchers discover SSHStalker botnet infecting Linux servers

Imeripotiwa na AI Picha iliyoundwa na AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

Imeripotiwa na AI

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

A critical vulnerability in React Server Components, known as React2Shell and tracked as CVE-2025-55182, is being actively exploited to deploy a new Linux backdoor called PeerBlight. This malware turns compromised servers into covert proxy and command-and-control nodes. Attackers use a single crafted HTTP request to execute arbitrary code on vulnerable Next.js and React applications.

Imeripotiwa na AI

Building on earlier PeerBlight attacks, Google Threat Intelligence reports exploitation of the React2Shell vulnerability (CVE-2025-55182) by China-nexus clusters and financially motivated actors deploying backdoors and cryptocurrency miners on vulnerable React and Next.js systems.

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Imeripotiwa na AI

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

Jumatatu, 9. Mwezi wa tatu 2026, 15:31:11

Researchers identify ClipXDaemon malware targeting Linux cryptocurrency users

Ijumaa, 6. Mwezi wa tatu 2026, 04:23:59

Linux rootkits advance with eBPF and io_uring techniques

Jumatano, 18. Mwezi wa pili 2026, 23:37:21

New SysUpdate malware variant targets Linux systems

Jumamosi, 14. Mwezi wa pili 2026, 06:39:37

SSHStalker botnet uses IRC to target Linux servers

Jumanne, 10. Mwezi wa pili 2026, 19:39:23

New Linux botnet SSHStalker uses IRC for command-and-control

Jumatano, 4. Mwezi wa pili 2026, 19:25:39

Russian hackers exploit Microsoft Office vulnerability days after patch

Jumatano, 21. Mwezi wa kwanza 2026, 05:18:40

AI-assisted VoidLink malware framework targets Linux cloud servers

Jumatano, 14. Mwezi wa kwanza 2026, 21:57:45

Check Point discovers advanced VoidLink Linux malware for clouds

Jumanne, 16. Mwezi wa kumi na mbili 2025, 23:12:04

React2Shell exploits continue with large-scale Linux backdoor deployments and cloud credential theft

Jumatatu, 27. Mwezi wa kumi 2025, 10:24:45

Qilin ransomware deploys Linux binaries against Windows systems

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa