LinkPro Linux Rootkit Uses eBPF to Hide From Security Tools

A new Linux rootkit named LinkPro has been discovered leveraging eBPF (extended Berkeley Packet Filter) technology to stealthily evade detection by security tools. This advanced rootkit uses eBPF programs to hook into the kernel and hide its presence, making it extremely difficult for traditional security mechanisms to detect malicious activities. LinkPro's use of eBPF represents a significant evolution in rootkit development, as it exploits legitimate kernel features to mask its operations. The rootkit can intercept system calls and manipulate kernel data structures, effectively concealing files, processes, and network connections associated with the malware. This technique allows attackers to maintain persistent and covert access to compromised Linux systems. Security researchers emphasize the importance of monitoring eBPF activity and implementing enhanced detection strategies to counter such sophisticated threats. Organizations running Linux environments should update their security protocols and consider deploying eBPF-aware monitoring tools to identify anomalous behaviors indicative of rootkit infections. The emergence of LinkPro highlights the growing trend of attackers leveraging advanced kernel-level features to bypass security defenses, underscoring the need for continuous innovation in cybersecurity defenses. This article explores the technical details of LinkPro's operation, its impact on Linux security, and recommended mitigation approaches to protect critical infrastructure from similar threats.

This Cyber News was published on thehackernews.com. Publication date: Thu, 16 Oct 2025 23:14:03 +0000


Cyber News related to LinkPro Linux Rootkit Uses eBPF to Hide From Security Tools

LinkPro Linux Rootkit Uses eBPF to Hide From Security Tools - A new Linux rootkit named LinkPro has been discovered leveraging eBPF (extended Berkeley Packet Filter) technology to stealthily evade detection by security tools. This advanced rootkit uses eBPF programs to hook into the kernel and hide its ...
4 months ago Thehackernews.com
LinkPro Rootkit Attacking GNU/Linux Systems - The LinkPro rootkit has emerged as a significant threat targeting GNU/Linux systems, showcasing advanced stealth capabilities and persistence mechanisms. This malware is designed to infiltrate Linux environments, often used in servers and critical ...
4 months ago Cybersecuritynews.com
Rootkit Turns Kubernetes from Orchestration to Subversion - As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers' crosshairs. Most successful attacks - at least those publicly reported - ...
2 years ago Darkreading.com
Wormable Linux Rootkit Attack Multiple Systems to Steal SSH Keys and Privilege Escalation - Cybersecurity researchers at ANY.RUN have uncovered a sophisticated attack leveraging the Diamorphine rootkit to deploy a cryptocurrency miner on Linux systems, highlighting the growing misuse of open-source tools in malicious campaigns. By replacing ...
9 months ago Cybersecuritynews.com
CVE-2023-53649 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
8 months ago Cybersecuritynews.com
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Krasue RAT Uses Cross-Kernel Linux Rootkit to Attack Telecoms - Attackers likely tied the creators of the XorDdos Linux remote access Trojan have been wielding a separate Linux RAT for nearly two years without detection, using it to target organizations in Thailand and maintain malicious access to infected ...
2 years ago Darkreading.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
11 months ago Cybersecuritynews.com
8 Tips on Leveraging AI Tools Without Compromising Security - Forecasts like the Nielsen Norman Group estimating that AI tools may improve an employee's productivity by 66% have companies everywhere wanting to leverage these tools immediately. How can companies employ these powerful AI/ML tools without ...
2 years ago Darkreading.com
Linux 'io_uring' security blindspot allows stealthy rootkit attacks - The flaw was discovered by ARMO security researchers who developed a proof-of-concept rootkit called "Curing" to demonstrate the practicality and feasibility of attacks leveraging io_uring for evasion. The researchers explain that io_uring supports a ...
10 months ago Bleepingcomputer.com
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
Cisco to Acquire Multi-Cloud Network & Security Startup Isovalent - In a strategic move destined to fortify its dominance in the ever-evolving realm of cloud security, Cisco has officially declared its intent to acquire Isovalent, a trailblazer in open-source cloud-native networking and security. This bold ...
2 years ago Gbhackers.com
What is App Security? SAST, DAST, IAST, and RASP. - Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing is a critical part of an application security strategy and should ...
2 years ago Feeds.dzone.com
Linux Rootkit Evades Elastic EDR Detection - A newly discovered Linux rootkit has demonstrated the ability to evade detection by Elastic Endpoint Detection and Response (EDR) solutions, raising significant concerns for cybersecurity professionals. This rootkit employs advanced stealth ...
4 months ago Cybersecuritynews.com
Singularity Linux Rootkit Evades Elastic EDR - A new sophisticated Linux rootkit named Singularity has been discovered, capable of evading detection by Elastic Endpoint Detection and Response (EDR) solutions. This rootkit employs advanced stealth techniques to maintain persistence and conceal its ...
4 months ago Cybersecuritynews.com
Navigating the Security Risks of Multicloud Management - The lack of visibility and control over multiple clouds exacerbates these risks, making it imperative for organizations to adopt robust cloud security practices. These tools enhance visibility across multiple cloud environments by providing a unified ...
1 year ago Darkreading.com
The Dangers of Remote Management & Monitoring Tools for Cybersecurity - Remote monitoring and management (RMM) tools are used by business organizations to manage and monitor their enterprise IT infrastructure from a central location. However, the increasing sophistication of hackers and cybercriminals has caused both ...
3 years ago Csoonline.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
11 months ago Cybersecuritynews.com
SonicWall releases SMA100 firmware update to wipe rootkit malware - SonicWall has released a critical firmware update for its SMA100 series appliances to address a severe rootkit malware infection. This update is designed to completely remove the malicious rootkit that had compromised the devices, ensuring enhanced ...
5 months ago Bleepingcomputer.com
SonicWall Firmware Update Contains Rootkit Malware, Warns Security Researchers - SonicWall, a leading cybersecurity company, recently issued a critical firmware update that was found to contain a rootkit malware. This alarming discovery was made by security researchers who warned users to be cautious when applying the update. The ...
5 months ago Cybersecuritynews.com CVE-2023-3519
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
1 year ago Techtarget.com
CVE-2022-50069 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
7 Best Vulnerability Scanning Tools & Software - Vulnerability scanning tools scan assets to identify missing patches, misconfigurations, exposed application vulnerabilities, and other security issues to be remediated. To help you select the best fitting vulnerability scanning solution, we've ...
2 years ago Esecurityplanet.com