From Bleeping Comoputer (https://www.bleepingcomputer.com/news/security/new-stealthy-pumakit-linux-rootkit-malware-spotted-in-the-wild/?fbclid=IwY2xjawHIVHxleHRuA2FlbQIxMQABHRV9DpDUf0mN03JqT3Qt4GyvkRD61K_KgTSyxiYB536IqZ7TuRrEKD1CDg_aem_xSspqEEVlPiVzrxYGzAvkg):
QuoteA new Linux rootkit malware called Pumakit has been discovered that uses stealth and advanced privilege escalation techniques to hide its presence on systems.
The malware is a multi-component set that includes a dropper, memory-resident executables, a kernel module rootkit, and a shared object (SO) userland rootkit.
Elastic Security discovered Pumakit in a suspicious binary ('cron') upload on VirusTotal, dated September 4, 2024, and reported having no visibility into who uses it and what it targets.
Generally, these tools are used by advanced threat actors targeting critical infrastructure and enterprise systems for espionage, financial theft, and disruption operations.
More at the referenced topic.