LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

Posted on October 16, 2025 • 1 min read • 63 words
Share via

An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

Read on Hackernews

An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. “This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely

Follow Us

Everything coding, technology, and digital Life