An ongoing espionage campaign is leveraging a new zero-day vulnerability in Cisco IOS XE software to install a highly persistent firmware rootkit named Shadow Persistence. The campaign, reported on February 16, 2026, targets critical infrastructure providers and government agencies. By compromising network edge devices with a rootkit that can survive reboots and factory resets, attackers can establish a long-term, stealthy foothold in target networks. This allows for sustained traffic interception, lateral movement, and data exfiltration. Organizations using Cisco IOS XE devices are urged to perform deep hardware integrity checks to detect potential compromise.
The Shadow Persistence rootkit represents a top-tier threat due to its stealth and persistence. The attack targets Cisco edge routers, which are high-value targets as they sit at the boundary between an organization's internal network and the internet.
The attack methodology is as follows:
By compromising the device at this low level, attackers can control the device completely and remain hidden from security tools that operate within the main OS.
This attack employs some of the most advanced techniques in the MITRE ATT&CK framework:
T1190 - Exploit Public-Facing Application: The initial access is gained by exploiting a vulnerability in the internet-facing IOS XE software.T1400 - Firmware/BIOS: This is the core of the attack. The attackers modify the device's firmware to install their rootkit, achieving an extremely high level of persistence.T1219 - Remote Access Software: The rootkit itself functions as a form of remote access software, giving the attackers a permanent backdoor into the network.T1547.001 - Registry Run Keys / Startup Folder: While this specific ID is for Windows, the concept is identical. The firmware modification is a powerful boot-time persistence mechanism.A successful Shadow Persistence attack has a critical impact:
Detecting a firmware-level rootkit is exceptionally difficult. Traditional security tools will likely see nothing wrong.
| Type | Value | Description |
|---|---|---|
| other | Firmware Hash Mismatch |
The most reliable method of detection is to compare the hash of the device's current firmware against a known-good hash from the manufacturer. |
| network_traffic_pattern | Anomalous Router Traffic |
Look for the router itself initiating outbound connections to unusual IP addresses, which is highly abnormal behavior. |
| other | Device Integrity Failures |
Some modern devices have hardware-based boot integrity checks (e.g., Secure Boot). Failures in these checks could indicate a compromise. |
D3-NTA - Network Traffic Analysis.D3-SU - Software Update.D3-TBI - TPM Boot Integrity.Hardware-based boot integrity mechanisms like Secure Boot are designed to prevent this type of attack by refusing to load tampered firmware.
Keeping device firmware and software updated is crucial to patch the vulnerabilities that allow rootkits to be installed in the first place.
Restricting access to the device's management interface reduces the attack surface available to external adversaries.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats