Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Linux Malware Showboat Targets Middle East Telecom

New Linux Malware Showboat Targets Middle East Telecom

Posted on May 21, 2026 By CWS

Cybersecurity experts have revealed a new threat in the form of a Linux-based malware named Showboat, which has been targeting a telecommunications company in the Middle East since mid-2022. This malware is particularly concerning due to its advanced capabilities and potential connections to Chinese cyber espionage groups.

Modular Framework and Capabilities

Showboat is identified as a sophisticated post-exploitation framework. Designed specifically for Linux systems, it is capable of initiating a remote shell, transferring files, and acting as a SOCKS5 proxy. According to Lumen Technologies Black Lotus Labs, the malware’s modular nature makes it a powerful tool for attackers.

The malware has been associated with several threat clusters possibly linked to China. These clusters have been identified through connections between command-and-control (C2) nodes and IP addresses traced back to Chengdu, China. This pattern aligns Showboat with other well-known frameworks like PlugX and ShadowPad, commonly used by Chinese state-sponsored actors.

Investigation and Technical Analysis

The investigation into Showboat began with an ELF binary uploaded to VirusTotal in May 2025. The platform classified it as a sophisticated Linux backdoor with rootkit-like features. Kaspersky has labeled this variant as EvaRAT, highlighting its advanced nature.

The malware communicates with a C2 server, collecting system information and sending it back in an encrypted format. It can also transfer files, conceal its processes, and manage connections to other devices through its SOCKS5 proxy capability. This functionality suggests that Showboat’s main objective is to establish a persistent presence on compromised systems.

Broader Implications and Security Concerns

Further investigation identified additional victims, including an ISP in Afghanistan and another unknown entity in Azerbaijan. A secondary C2 cluster, utilizing similar certificates, indicated possible compromises in the U.S. and Ukraine, pointing to a broader reach of the attack.

While some attackers favor native system tools for stealth, others, like those using Showboat, employ persistent malware implants. Black Lotus Labs researcher Danny Adamitis emphasized that such threats should be viewed as early warnings of potential larger security issues in affected networks.

The discovery of Showboat underscores the ongoing challenges of cybersecurity in the telecommunications sector, particularly regarding nation-state-backed threats. Organizations must remain vigilant and implement robust security measures to protect against such sophisticated attacks.

The Hacker News Tags:Black Lotus Labs, C2 Server, China, cyber espionage, cyber threats, Cybersecurity, digital security, hacker news, Kaspersky, Linux malware, Middle East telecom, Showboat, SOCKS5 proxy, Telecommunications, threat intelligence

Post navigation

Previous Post: P2PInfect Botnet Threatens Kubernetes via Exposed Redis
Next Post: Socket Secures $60 Million, Reaches $1 Billion Valuation

Related Posts

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks The Hacker News
Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns The Hacker News
Dangerous npm Package Steals macOS Credentials Dangerous npm Package Steals macOS Credentials The Hacker News
Vercel Data Breach Linked to Context AI Compromise Vercel Data Breach Linked to Context AI Compromise The Hacker News
Why Early Threat Detection Is a Must for Long-Term Business Growth Why Early Threat Detection Is a Must for Long-Term Business Growth The Hacker News
Understanding and Mitigating Lethal Paths in AppSec Understanding and Mitigating Lethal Paths in AppSec The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Socket Secures $60 Million, Reaches $1 Billion Valuation
  • New Linux Malware Showboat Targets Middle East Telecom
  • P2PInfect Botnet Threatens Kubernetes via Exposed Redis
  • Apple Blocks 2 Million App Store Apps for Security in 2025
  • Linux Rootkits and AI Intrusions: Key Security Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Socket Secures $60 Million, Reaches $1 Billion Valuation
  • New Linux Malware Showboat Targets Middle East Telecom
  • P2PInfect Botnet Threatens Kubernetes via Exposed Redis
  • Apple Blocks 2 Million App Store Apps for Security in 2025
  • Linux Rootkits and AI Intrusions: Key Security Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark