Ooh baby you know I'm gonna dig in on a eBPF rootkit analysis.
https://www.synacktiv.com/en/publications/linkpro-ebpf-rootkit-analysis.html
Ooh baby you know I'm gonna dig in on a eBPF rootkit analysis.
https://www.synacktiv.com/en/publications/linkpro-ebpf-rootkit-analysis.html
Okay that is legitimately sick:
LinkPro modifies the /etc/ld.so.preload configuration file to specify the path of the libld.so shared library that it embeds, with the goal of hiding various artifacts that could reveal the backdoor's presence.
Once libld.so is loaded at the execution of a program, for example /usr/bin/ls, it hooks (before glibc) several libc functions to modify results that could reveal the presence of LinkPro. Here is the observed behavior for the hooked functions:
Modifying LD_PRELOAD is a well-known TTP (T1574.006). However, most detections will be about the environment variable, not the .so files themselves being mutated. Of course, this all requires root to accomplish, but this kind of stealthy persistence is exactly what basic detection tools will miss.
systemd-resolveld. Look closely!