An ongoing espionage campaign is leveraging a new zero-day vulnerability in Cisco IOS XE software to install a highly persistent firmware rootkit named Shadow Persistence. The campaign, reported on February 16, 2026, targets critical infrastructure providers and government agencies. By compromising network edge devices with a rootkit that can survive reboots and factory resets, attackers can establish a long-term, stealthy foothold in target networks. This allows for sustained traffic interception, lateral movement, and data exfiltration. Organizations using Cisco IOS XE devices are urged to perform deep hardware integrity checks to detect potential compromise.
The Shadow Persistence rootkit represents a top-tier threat due to its stealth and persistence. The attack targets Cisco edge routers, which are high-value targets as they sit at the boundary between an organization's internal network and the internet.
The attack methodology is as follows:
By compromising the device at this low level, attackers can control the device completely and remain hidden from security tools that operate within the main OS.
This attack employs some of the most advanced techniques in the MITRE ATT&CK framework:
T1190 - Exploit Public-Facing Application: The initial access is gained by exploiting a vulnerability in the internet-facing IOS XE software.T1400 - Firmware/BIOS: This is the core of the attack. The attackers modify the device's firmware to install their rootkit, achieving an extremely high level of persistence.T1219 - Remote Access Software: The rootkit itself functions as a form of remote access software, giving the attackers a permanent backdoor into the network.T1547.001 - Registry Run Keys / Startup Folder: While this specific ID is for Windows, the concept is identical. The firmware modification is a powerful boot-time persistence mechanism.A successful Shadow Persistence attack has a critical impact:
Detecting a firmware-level rootkit is exceptionally difficult. Traditional security tools will likely see nothing wrong.
Firmware Hash MismatchAnomalous Router TrafficDevice Integrity FailuresD3-NTA - Network Traffic Analysis.D3-SU - Software Update.D3-TBI - TPM Boot Integrity.Hardware-based boot integrity mechanisms like Secure Boot are designed to prevent this type of attack by refusing to load tampered firmware.
Keeping device firmware and software updated is crucial to patch the vulnerabilities that allow rootkits to be installed in the first place.
Restricting access to the device's management interface reduces the attack surface available to external adversaries.
The 'Shadow Persistence' rootkit and associated espionage campaign are reported.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.