Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Waymo suspends service in Atlanta as robotaxis continue to plunge into floodwaters

Showboat Linux malware uses SOCKS5 proxy backdoor to attack telecom companies in the Middle East

Flipper launches Linux-based networking gadget built for hackers and modders

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Showboat Linux malware uses SOCKS5 proxy backdoor to attack telecom companies in the Middle East
Identity

Showboat Linux malware uses SOCKS5 proxy backdoor to attack telecom companies in the Middle East

By May 21, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananMay 21, 2026Cyber ​​espionage/threat intelligence

Cybersecurity researchers have revealed details of a new Linux malware called Showboat that has been used in campaigns targeting telecommunications providers in the Middle East since at least mid-2022.

“Showboat is a modular post-exploitation framework designed for Linux systems that can spawn remote shells, transfer files, and act as a SOCKS5 proxy,” Lumen Technologies Black Lotus Labs said in a report shared with The Hacker News.

The malware has been assessed to be used in at least one, and possibly more, threat activity clusters linked to China, with a correlation between command and control (C2) nodes and IP addresses located in Chengdu, the capital of China’s Sichuan province.

This puts Showboat alongside other shared frameworks such as PlugX, ShadowPad, and NosyDoor that are used by multiple China-related groups. This “pool of resources” strengthens the presence of digital quartermasters that Chinese state-sponsored attackers have relied on to provide the necessary tools.

The starting point for the investigation was an ELF binary uploaded to VirusTotal in May 2025, which the malware scanning platform classified as an advanced Linux backdoor with rootkit-like functionality. Kaspersky Lab tracks this artifact as EvaRAT.

The malware is designed to connect to a C2 server, collect system information, and send that information to the server as an encrypted, Base64-encoded string in a PNG field. It also has the ability to upload and download files to and from the host machine, hide its presence from the process list, and manage the C2 server.

Showboat obtains code snippets hosted in Pastebin to hide itself on the host machine. This paste was created on January 11, 2022. Additionally, the malware is able to scan other devices and connect to them via SOCKS5 proxies. This suggests that Showboat’s primary purpose is to establish a foothold on a compromised system.

“This allows an attacker to interact with a machine that is not exposed to the Internet and only accessible via the LAN,” Black Lotus Labs said.

Further infrastructure analysis revealed two victims: an Internet Service Provider (ISP) based in Afghanistan and another unknown organization located in Azerbaijan. A secondary C2 cluster using a similar X.509 certificate as the original C2 server resulted in two possible breaches in the United States and one in Ukraine.

“While some attackers are increasingly using stealthy native system tools to avoid detection, others are still deploying persistent malware implants,” said Danny Adamitis, a researcher at Black Lotus Labs. “The presence of such threats should be viewed as an early warning sign of the potential for broader and more serious security issues within the affected network.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFlipper launches Linux-based networking gadget built for hackers and modders
Next Article Waymo suspends service in Atlanta as robotaxis continue to plunge into floodwaters

Related Posts

Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

May 21, 2026

Microsoft warns of two actively exploited Defender vulnerabilities

May 21, 2026

When identity becomes an attack vector

May 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Waymo suspends service in Atlanta as robotaxis continue to plunge into floodwaters

Showboat Linux malware uses SOCKS5 proxy backdoor to attack telecom companies in the Middle East

Flipper launches Linux-based networking gadget built for hackers and modders

Circular economy activities could reduce EU climate change impact by 22%

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.