Root of All Evil: LinkPro Linux Rootkit Unleashes Chaos on AWS!

The AWS compromise led to the discovery of LinkPro, a sneaky new GNU/Linux rootkit. It waits for a ‘magic packet’ to activate, like a secret agent waiting for a coded message. This rootkit’s stealth mode is so good, it might just convince your server it’s a ninja.

Pro Dashboard

Hot Take:

Who knew that magic packets were the new rabbit foot of hackers? While you’re busy updating your Jenkins server, these cyber tricksters have turned your AWS infrastructure into their personal magic show, complete with disappearing files and conjured-up command executions. One day you’re building in the cloud, and the next, you’ve got a rootkit that thinks it’s Houdini. Poof! Your security just vanished.

Key Points:

  • LinkPro, a new GNU/Linux rootkit, has been discovered infiltrating AWS infrastructure through an exploited Jenkins server.
  • The rootkit uses two eBPF modules for concealment and activation via a “magic packet.”
  • A malicious Docker image and additional malware strains were deployed on Kubernetes clusters.
  • LinkPro’s stealth includes modifying the “/etc/ld.so.preload” file to hide its presence.
  • The attack’s sophistication suggests financially motivated threat actors, but their identity remains unknown.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?