Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Singularity Linux Kernel Rootkit with New Feature Prevents Detection

Posted on December 17, 2025December 17, 2025 By CWS

Singularity, a complicated Linux kernel rootkit designed for Linux kernel variations 6.x, has gained important consideration from the cybersecurity group for its superior stealth mechanisms and highly effective capabilities.

This kernel module represents a regarding evolution in rootkit expertise, providing a number of assault vectors and complete evasion strategies that problem present detection programs.

The rootkit operates on the kernel degree utilizing Linux Kernel Module (LKM) structure, making it exceptionally troublesome to detect and take away.

Created by safety researcher MatheuZSecurity, Singularity leverages ftrace infrastructure to hook system calls, successfully giving attackers full management over Linux programs whereas remaining invisible to safety instruments and directors.

Singularity combines course of hiding, file concealment, and community stealth right into a single unified platform. The malware can disguise any working course of, take away recordsdata from listing listings, masks community connections, and immediately escalate privileges to root.

Its kernel-level operation allows real-time log filtering, stopping traces of its presence from showing in system journals or kernel debugging output.

GitHub analysts and researchers famous that Singularity introduces a number of unprecedented options particularly designed to bypass enterprise safety instruments, together with endpoint detection and response (EDR) options.

The rootkit consists of mechanisms to dam eBPF-based safety monitoring, disable io_uring protections, and forestall reliable kernel module loading, creating a number of limitations to detection.

Provides refined capabilities

The malware supplies distant entry through an ICMP-triggered reverse shell. Attackers can ship specifically crafted ICMP packets containing a magic sequence to ascertain hidden command and management connections that stay solely invisible for community monitoring instruments like netstat, tcpdump, and packet analyzers.

All baby processes spawned by this channel routinely inherit the hiding properties.

Singularity’s detection evasion goes past easy hiding. The rootkit actively intercepts and filters makes an attempt to disable ftrace, primarily neutralizing certainly one of Linux’s main monitoring frameworks.

It screens greater than 15 delicate syscalls associated to file I/O, together with write, splice, sendfile, and copy_file_range.

Any course of making an attempt to entry these capabilities receives rapid suggestions indicating success, whereas the rootkit silently prevents precise execution.

Obtain root shell (Supply – GitHub)

The kernel taint mechanism, which marks suspicious kernel conduct, is constantly normalized by Singularity’s tainted_mask clearing thread. This prevents forensic analysts from detecting unauthorized kernel modifications.

Mixed with aggressive log sanitization that filters key phrases like taint, journal, and kallsyms_lookup_name, Singularity leaves nearly no forensic proof of its operation on compromised programs.

Testing reveals the rootkit efficiently bypasses customary detection instruments, together with unhide, chkrootkit, and rkhunter.

Its compatibility throughout a number of architectures—x64 and ia32—and help for varied kernel variations make it a versatile menace throughout numerous Linux deployments.

Safety groups ought to contemplate these findings essential when evaluating their Linux safety posture.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Detection, Feature, Kernel, Linux, Prevents, Rootkit, Singularity

Post navigation

Previous Post: Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking
Next Post: Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes

Related Posts

Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice Cyber Security News
Weaponized DMV-Themed Phishing Attacking U.S. Citizens to Harvest Personal and Financial Data Cyber Security News
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication Cyber Security News
Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions Cyber Security News
Tenable Confirms Data Breach – Hackers Accessed Customers Contact Details Cyber Security News
NVIDIA Merlin Vulnerabilities Let Attackers Execute Malicious Code and Trigger DoS Condition Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark