Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit OrBit Rootkit to Steal Linux Credentials

Hackers Exploit OrBit Rootkit to Steal Linux Credentials

Posted on May 15, 2026 By CWS

Recent analysis reveals that the OrBit rootkit has been targeting Linux systems globally, covertly capturing login credentials and remaining undetected by many security measures. This rootkit, initially thought to be custom-made, is now identified as a modified version of a publicly available tool, Medusa, spreading via various hacking entities.

OrBit’s Modus Operandi

The OrBit rootkit embeds itself deeply into a Linux system, connecting to over forty fundamental functions, rendering it nearly invisible. Once infiltrated, it eavesdrops on SSH and sudo login attempts, collecting and storing credentials in a concealed directory, undetectable by typical system scans. Hackers then establish a connection through a hidden SSH backdoor, bypassing internet command transmission.

Intezer’s researchers, in a report shared with Cyber Security News, disclosed that OrBit is not original, but a derivative of Medusa, a rootkit available on GitHub since December 2022. Hackers have repurposed existing code, altering source files, rotating passwords, and changing installation paths to evade detection.

Technical Analysis and Variants

Intezer’s research documented more than a dozen OrBit samples from 2022 to 2026 through static and differential analysis. Two distinct build paths emerged: Lineage A, a full-featured version, and Lineage B, a simplified variant that ceased development after 2024, suggesting a consolidation into the main build.

OrBit achieves persistence by modifying the dynamic linker configuration, ensuring the rootkit loads into every system process. This allows it to intercept file access, directory listings, and network data, maintaining invisibility from administrators and security tools. The rootkit stores captured information in a hidden directory, /lib/libseconf/, unreachable by standard tools due to its own hooks.

Exploitation by Multiple Hacker Groups

The research highlights that at least three hacker groups have used OrBit. Notably, UNC3886, a state-sponsored group, utilized OrBit with unique encryption keys and installation paths identical to Intezer’s 2024 Lineage A samples. BLOCKADE SPIDER, an eCrime group noted for Embargo ransomware, also used OrBit to maintain access in VMware environments, according to CrowdStrike’s 2026 Global Threat Report.

Another 2025 campaign involved a dropper architecture similar to the Linux-based RHOMBUS botnet, sharing infrastructure in Russia. Security experts recommend monitoring for specific filenames like sshpass.txt and .logpam in unusual directories, as these are consistent artifacts of the Medusa build pipeline. YARA rules can detect any version of this rootkit family, despite new credentials and paths.

In summary, the OrBit rootkit represents a significant threat to Linux systems, with multiple sophisticated hacker groups exploiting its capabilities. Continuous vigilance and updated detection measures are crucial for cybersecurity defenses.

Cyber Security News Tags:backdoor access, credential theft, cyber defense, cyber espionage, cyber threat, Cybersecurity, hacker groups, hacking groups, Intezer report, Linux security, malware analysis, OrBit rootkit, rootkit threats, SSH credentials, system security

Post navigation

Previous Post: OpenAI Addresses TanStack Supply Chain Breach

Related Posts

U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity U.S. Treasury Warns of Crypto ATMs Fueling Criminal Activity Cyber Security News
Hackers Exploit Npm Package to Target AI Developers Hackers Exploit Npm Package to Target AI Developers Cyber Security News
UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware Cyber Security News
PHP Developer Community Threatened by Malicious Packages PHP Developer Community Threatened by Malicious Packages Cyber Security News
New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT Cyber Security News
New Windows Notepad and Paint Update Brings More Useful AI Features New Windows Notepad and Paint Update Brings More Useful AI Features Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk
  • Urgent Advisory: Exchange Server Zero-Day Exploited

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk
  • Urgent Advisory: Exchange Server Zero-Day Exploited

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark