LinkPro Rootkit Attacking GNU/Linux Systems

The LinkPro rootkit has emerged as a significant threat targeting GNU/Linux systems, showcasing advanced stealth capabilities and persistence mechanisms. This malware is designed to infiltrate Linux environments, often used in servers and critical infrastructure, allowing attackers to maintain long-term access and control. LinkPro leverages sophisticated techniques to evade detection by traditional security tools, including kernel-level rootkit functionalities that manipulate system processes and hide malicious activities. The rootkit's deployment is typically associated with targeted attacks, suggesting involvement by skilled threat actors aiming to compromise high-value Linux-based assets. Security researchers emphasize the importance of updated detection methods and proactive monitoring to identify and mitigate LinkPro infections. Organizations relying on Linux systems are urged to implement robust security practices, including regular system audits, integrity checks, and the use of advanced endpoint detection and response (EDR) solutions. Understanding the operational tactics of LinkPro is crucial for developing effective defense strategies against this evolving threat. This article delves into the technical aspects of LinkPro, its impact on GNU/Linux environments, and recommended countermeasures to enhance system resilience against rootkit attacks.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 17 Oct 2025 10:50:13 +0000


Cyber News related to LinkPro Rootkit Attacking GNU/Linux Systems

LinkPro Rootkit Attacking GNU/Linux Systems - The LinkPro rootkit has emerged as a significant threat targeting GNU/Linux systems, showcasing advanced stealth capabilities and persistence mechanisms. This malware is designed to infiltrate Linux environments, often used in servers and critical ...
3 months ago Cybersecuritynews.com
LinkPro Linux Rootkit Uses eBPF to Hide From Security Tools - A new Linux rootkit named LinkPro has been discovered leveraging eBPF (extended Berkeley Packet Filter) technology to stealthily evade detection by security tools. This advanced rootkit uses eBPF programs to hook into the kernel and hide its ...
3 months ago Thehackernews.com
Wormable Linux Rootkit Attack Multiple Systems to Steal SSH Keys and Privilege Escalation - Cybersecurity researchers at ANY.RUN have uncovered a sophisticated attack leveraging the Diamorphine rootkit to deploy a cryptocurrency miner on Linux systems, highlighting the growing misuse of open-source tools in malicious campaigns. By replacing ...
9 months ago Cybersecuritynews.com
Rootkit Turns Kubernetes from Orchestration to Subversion - As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers' crosshairs. Most successful attacks - at least those publicly reported - ...
2 years ago Darkreading.com
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Krasue RAT Uses Cross-Kernel Linux Rootkit to Attack Telecoms - Attackers likely tied the creators of the XorDdos Linux remote access Trojan have been wielding a separate Linux RAT for nearly two years without detection, using it to target organizations in Thailand and maintain malicious access to infected ...
2 years ago Darkreading.com
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
Singularity Linux Rootkit Evades Elastic EDR - A new sophisticated Linux rootkit named Singularity has been discovered, capable of evading detection by Elastic Endpoint Detection and Response (EDR) solutions. This rootkit employs advanced stealth techniques to maintain persistence and conceal its ...
3 months ago Cybersecuritynews.com
Linux Rootkit Evades Elastic EDR Detection - A newly discovered Linux rootkit has demonstrated the ability to evade detection by Elastic Endpoint Detection and Response (EDR) solutions, raising significant concerns for cybersecurity professionals. This rootkit employs advanced stealth ...
3 months ago Cybersecuritynews.com
SonicWall releases SMA100 firmware update to wipe rootkit malware - SonicWall has released a critical firmware update for its SMA100 series appliances to address a severe rootkit malware infection. This update is designed to completely remove the malicious rootkit that had compromised the devices, ensuring enhanced ...
4 months ago Bleepingcomputer.com
SonicWall Firmware Update Contains Rootkit Malware, Warns Security Researchers - SonicWall, a leading cybersecurity company, recently issued a critical firmware update that was found to contain a rootkit malware. This alarming discovery was made by security researchers who warned users to be cautious when applying the update. The ...
4 months ago Cybersecuritynews.com CVE-2023-3519
Linux 'io_uring' security blindspot allows stealthy rootkit attacks - The flaw was discovered by ARMO security researchers who developed a proof-of-concept rootkit called "Curing" to demonstrate the practicality and feasibility of attacks leveraging io_uring for evasion. The researchers explain that io_uring supports a ...
9 months ago Bleepingcomputer.com
Embedded Linux IoT Security: Defending Against Cyber Threats - Embedded Linux IoT systems are now essential parts of many different kinds of products, from industrial machinery and smart appliances to medical equipment and automobile systems. As Embedded Linux is being used widely, it has attracted the attention ...
2 years ago Securityboulevard.com
The Embedded Systems and The Internet of Things - The Internet of Things is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This concept is gaining its popularity amongst the embedded systems that exist - let's say - 10 or ...
2 years ago Cyberdefensemagazine.com
IT and OT cybersecurity: A holistic approach - In comparison, OT refers to the specialized systems that control physical processes and industrial operations. OT Technologies include industrial control systems, SCADA systems and programmable logic controllers that directly control physical ...
2 years ago Securityintelligence.com
Cisco routers targeted by rootkit campaign exploiting CVE-2023-20255 vulnerability - A recent cybersecurity investigation has uncovered a sophisticated rootkit campaign targeting Cisco routers by exploiting the CVE-2023-20255 vulnerability. This vulnerability, found in Cisco's IOS and IOS XE software, allows attackers to gain ...
3 months ago Infosecurity-magazine.com CVE-2023-20255
Krasue RAT Malware: A New Threat to Linux Systems - In the field of cybersecurity, a potent and covert threat called Krasue has surfaced. This remote access trojan has been silently infiltrating Linux systems, primarily targeting telecommunications companies since 2021. This blog post will explore ...
2 years ago Securityboulevard.com
SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware - It is unclear how the hackers obtained initial access, but researchers investigating UNC6148 attacks noticed that the threat actor already had local administrator credentials on the targeted appliance. With shell access on the appliance, the threat ...
6 months ago Bleepingcomputer.com Abyss Hunters
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
2 years ago Securityboulevard.com
PurpleFox malware infected thousands of systems in Ukraine - The Computer Emergency Response Team in Ukraine is warning about a PurpleFox malware campaign that has infected at least 2,000 computers in the country. The exact impact of this widespread infection and whether it has affected state organizations or ...
2 years ago Bleepingcomputer.com
CVE-2020-8023 - A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of ...
5 years ago
PurpleFox malware infects thousands of computers in Ukraine - The Computer Emergency Response Team in Ukraine is warning about a PurpleFox malware campaign that has infected at least 2,000 computers in the country. The exact impact of this widespread infection and whether it has affected state organizations or ...
2 years ago Bleepingcomputer.com
Top 10 Best Linux Firewalls - 2025 - It protects computers/networks via secure programming.1. Old PCs only boot from CDROM, while network boot requires a net card with a boot ROM.2. Its web interface is very user-friendly and makes usage easy.2. User-created rules take longer to ...
10 months ago Cybersecuritynews.com
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
3 years ago Bleepingcomputer.com