Press ESC to close

Hackers Exploiting Linux eBPF to Spread Malware in Ongoing Campaign

Category Details
Threat Actors – Likely government-backed hackers and cybercriminals
Campaign Overview – Linux malware campaign exploiting eBPF technology
– Targets businesses and users globally
– Uses eBPF rootkits and public platforms for command-and-control configuration
Target Regions (Victims) – Businesses and users in Southeast Asia and globally
Methodology – Exploits eBPF technology for hiding activities and bypassing security measures
– Deploys rootkits and remote access Trojans
– Stores malware configurations on public platforms like GitHub and blogs
Product Targeted – Linux operating systems
Malware Reference – eBPF-based malware families: Boopkit, BPFDoor, Symbiote
– Remote Access Trojans: Trojan.Siggen28.58279, Trojan:Win32/Siggen.GR!MTB
Tools Used – eBPF technology
– Public platforms (e.g., GitHub, blogs)
– Trojanized rootkits
Vulnerabilities Exploited – Over 100 new vulnerabilities in eBPF technology identified in 2024
TTPs – Abuse of eBPF for network manipulation and data exfiltration
– Hiding malware configurations on public platforms
– Leveraging rootkits for persistence and stealth
Attribution – Government-backed threat actors and cybercriminals
Recommendations – Monitor eBPF activity and configurations
– Employ behavioral detection for rootkits and Trojans
– Scrutinize public platform network activity
– Patch vulnerabilities in Linux systems
Source Hackread

 

Read full article: https://hackread.com/hackers-exploit-linux-ebpf-malware-ongoing-campaign/

The above summary has been generated by an AI language model

Source: Hackread

Published on: December 18, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *