A newly discovered Linux malware, known as Showboat, has been targeting a Middle Eastern telecommunications provider since at least mid-2022. This modular post-exploitation framework is capable of establishing a remote shell, transferring files, and operating as a SOCKS5 proxy, allowing attackers to route traffic through compromised systems1. Showboat's design enables it to spawn new modules, making it a flexible and potentially powerful tool for malicious actors. The malware's use in targeting a specific industry and region suggests a focused campaign, potentially aimed at gathering sensitive information or disrupting critical infrastructure. The presence of a SOCKS5 proxy backdoor in Showboat allows attackers to maintain a stealthy presence within compromised networks, making detection and remediation more challenging. This discovery matters to cybersecurity practitioners because it highlights the need for enhanced monitoring and detection capabilities to identify and mitigate sophisticated Linux-based threats.