Deep Dive Into a Linux Rootkit Malware


This is a follow-up analysis to a previous blog about a zero day exploit where the FortiGuard Incident Response (FGIR) team examined how remote attackers exploited multiple vulnerabilities in an appliance to gain control of a customer’s system.

At the end of that blog, Fortinet researchers revealed that the remote attacker had deployed a rootkit (a loadable kernel module, sysinitd.ko) and a user-space binary file (sysinitd) on the affected system by executing a shell script (Install.sh). Additionally, to establish rootkit persistence, entries for the rootkit malware were added in the /etc/rc.local and /etc/rc.d/rc.local files so the rootkit malware is loaded during system startup.

Read more…
Source: Fortinet


Sign up for our Newsletter


Related:

  • EU sanctions Chinese and Iranian companies for cyber attacks

    March 16, 2026

    The European Union on Monday imposed sanctions against ‌two China-based and one Iranian ‌company for cyber attacks against EU member ​states. The EU listed China-based Integrity Technology Group and Anxun Information Technology, and Iranian company Emennet Pasargad. Integrity Technology ‌is seen ⁠to have enabled hacks of over65,000 devices across six member ⁠states, according to an EUstatement. ...

  • UAE: Up to 100 people arrested by police for filming drone or missile strikes

    March 14, 2026

    Up to 100 people have been arrested by police in the UAE for filming drone or missile strikes, it emerged this morning. Abu Dhabi Police alone have arrested 45 people of multiple nationalities for filming various locations amid current ongoing events and posting clips on social media. In neighbouring Dubai, at least 21 people, including a ...

  • Google patches two Chrome zero-days under active attack

    March 13, 2026

    Update March 16, 2026 Earlier this week, Google incorrectly reported that an actively exploited vulnerability in Chrome had been fixed, and has now announced it will roll out a new update to protect users against the vulnerability tracked as CVE-2026-3909. Original content: Google has released an out-of-band security update for Chrome desktop that patches two high‑severity ...

  • Swedish government IT system hacked

    March 13, 2026

    A large amount of sensitive information allegedly coming from a Swedish government IT system has been posted on the darknet, according to Dagens Nyheter and Expressen. DN writes that the newspaper has taken note of the leak and that it appears to contain the source code for a digital identity management system used by several authorities. ...

  • Telus probes cybersecurity incident that ‘ShinyHunters’ group claims responsibility for

    March 12, 2026

    Canadian telecommunications and business services firm Telus is investigating a cybersecurity incident involving unauthorized access to some ‌of its systems, a company spokesperson said on Thursday. The ShinyHunters hacking group told Reuters in a message it stole at least 700 terabytes ​of data from Telus. All business ​operations within the company “remain fully operational, and there ...

  • CISA warns max-severity n8n bug is being exploited in the wild

    March 12, 2026

    The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that hackers are exploiting a max-severity remote code execution (RCE) vulnerability in workflow automation platform n8n. CISA urged all federal civilian executive branch (FCEB) agencies to patch CVE-2025-68613 at once because it carries a near-perfect 9.9 vulnerability score. The bug was first disclosed in December, and ...