Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Singularity Linux Kernel Rootkit with New Feature Prevents Detection

Posted on December 17, 2025December 17, 2025 By CWS

Singularity, a complicated Linux kernel rootkit designed for Linux kernel variations 6.x, has gained important consideration from the cybersecurity group for its superior stealth mechanisms and highly effective capabilities.

This kernel module represents a regarding evolution in rootkit expertise, providing a number of assault vectors and complete evasion strategies that problem present detection programs.

The rootkit operates on the kernel degree utilizing Linux Kernel Module (LKM) structure, making it exceptionally troublesome to detect and take away.

Created by safety researcher MatheuZSecurity, Singularity leverages ftrace infrastructure to hook system calls, successfully giving attackers full management over Linux programs whereas remaining invisible to safety instruments and directors.

Singularity combines course of hiding, file concealment, and community stealth right into a single unified platform. The malware can disguise any working course of, take away recordsdata from listing listings, masks community connections, and immediately escalate privileges to root.

Its kernel-level operation allows real-time log filtering, stopping traces of its presence from showing in system journals or kernel debugging output.

GitHub analysts and researchers famous that Singularity introduces a number of unprecedented options particularly designed to bypass enterprise safety instruments, together with endpoint detection and response (EDR) options.

The rootkit consists of mechanisms to dam eBPF-based safety monitoring, disable io_uring protections, and forestall reliable kernel module loading, creating a number of limitations to detection.

Provides refined capabilities

The malware supplies distant entry through an ICMP-triggered reverse shell. Attackers can ship specifically crafted ICMP packets containing a magic sequence to ascertain hidden command and management connections that stay solely invisible for community monitoring instruments like netstat, tcpdump, and packet analyzers.

All baby processes spawned by this channel routinely inherit the hiding properties.

Singularity’s detection evasion goes past easy hiding. The rootkit actively intercepts and filters makes an attempt to disable ftrace, primarily neutralizing certainly one of Linux’s main monitoring frameworks.

It screens greater than 15 delicate syscalls associated to file I/O, together with write, splice, sendfile, and copy_file_range.

Any course of making an attempt to entry these capabilities receives rapid suggestions indicating success, whereas the rootkit silently prevents precise execution.

Obtain root shell (Supply – GitHub)

The kernel taint mechanism, which marks suspicious kernel conduct, is constantly normalized by Singularity’s tainted_mask clearing thread. This prevents forensic analysts from detecting unauthorized kernel modifications.

Mixed with aggressive log sanitization that filters key phrases like taint, journal, and kallsyms_lookup_name, Singularity leaves nearly no forensic proof of its operation on compromised programs.

Testing reveals the rootkit efficiently bypasses customary detection instruments, together with unhide, chkrootkit, and rkhunter.

Its compatibility throughout a number of architectures—x64 and ia32—and help for varied kernel variations make it a versatile menace throughout numerous Linux deployments.

Safety groups ought to contemplate these findings essential when evaluating their Linux safety posture.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Detection, Feature, Kernel, Linux, Prevents, Rootkit, Singularity

Post navigation

Previous Post: Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking
Next Post: Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes

Related Posts

5 New Trends In Phishing Attacks On Businesses  Cyber Security News
Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code Cyber Security News
New Phishing Attack Mimics Google AppSheet to Steal Login Credentials Cyber Security News
New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code Cyber Security News
Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks Cyber Security News
Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence
  • BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams Down – Users Face Messaging Delays and Service Disruptions Worldwide
  • Thailand Conference Launches International Initiative to Fight Online Scams
  • 25,000+ FortiCloud SSO-Enabled Devices Exposed to Remote Attacks
  • Criminal IP and Palo Alto Networks Cortex XSOAR Integrate to Deliver AI-Driven Exposure Intelligence
  • BlueDelta Hackers Attacking Users of Widely Used Ukrainian Webmail and News Service

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark