LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

Written by:

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv.
“This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely

Source: https://thehackernews.com/2025/10/linkpro-linux-rootkit-uses-ebpf-to-hide.html

#rootkituses #linuxrootkit #rootkit #usesebpf #linkprolinux

Leave a comment

Design a site like this with WordPress.com
Get started