New 'LinkPro' Linux Rootkit Uses eBPF and 'Magic Packets' for Ultimate Stealth

Novel 'LinkPro' Linux Rootkit Discovered Using eBPF for Stealth and Remote Activation via Magic Packet

HIGH
October 16, 2025
6m read
MalwareCloud Security

Related Entities

Organizations

Products & Tech

eBPF Jenkins DockerKubernetesGNU/Linux

Other

LinkPro

CVE Identifiers

Full Report

Executive Summary

Security researchers at the French firm Synacktiv have discovered a highly sophisticated and stealthy GNU/Linux rootkit named LinkPro. The malware was found during an investigation of a compromised Amazon Web Services (AWS) infrastructure. LinkPro utilizes advanced, modern techniques to evade detection. Its core features include the use of two extended Berkeley Packet Filter (eBPF) modules: one to hook kernel functions and hide its own presence (files, processes, network connections), and another to act as a network sniffer that activates the rootkit only upon receiving a specific "magic packet." This allows the malware to remain completely dormant and invisible on a compromised system until the attacker chooses to activate it. The initial compromise was achieved by exploiting CVE-2024-23897 in a public-facing Jenkins server, followed by the deployment of a malicious Docker image.


Threat Overview

The discovery of LinkPro highlights a growing trend of malware authors adopting eBPF to create powerful and evasive rootkits. eBPF allows programs to run in a sandboxed environment within the Linux kernel, making it a powerful tool for both performance monitoring and, in this case, malicious activity.

Attack Chain:

  1. Initial Access: The attackers exploited CVE-2024-23897, a known vulnerability in a Jenkins server, to gain an initial foothold in the target's AWS environment.
  2. Deployment: The attackers deployed a malicious Docker Hub image named kvlnt/vv onto the victim's Kubernetes clusters. This image, based on Kali Linux, contained the LinkPro rootkit components.
  3. Execution & Persistence: The rootkit is installed and executed. It then loads its eBPF modules into the kernel.
  4. Stealth: One eBPF module hooks various kernel functions (kprobes) to filter out any information related to the rootkit's files, processes, or network activity from being returned by system utilities like ls, ps, and netstat.
  5. Dormant C2: The second eBPF module attaches to a raw network socket (XDP - eXpress Data Path) to inspect all incoming network packets at a very low level. It lies dormant, waiting for a TCP packet with specific characteristics (the "magic packet").
  6. Activation: When the magic packet is received, the rootkit activates, likely establishing a reverse shell or other command-and-control channel to the attacker.

Technical Analysis

LinkPro represents a significant step up in Linux rootkit sophistication.

MITRE ATT&CK Techniques:

eBPF for Malice:

The use of eBPF is what makes LinkPro so dangerous:

  • Kernel-Level Operation: eBPF programs run within the kernel, giving them a high level of privilege and the ability to intercept and manipulate system calls.
  • Hiding: By hooking functions related to file and process listing, the rootkit can effectively become invisible to standard administrative tools and some security software operating in user space.
  • Stealthy C2 Trigger: Using an eBPF program to sniff for a magic packet is far stealthier than maintaining a constant C2 connection or listening on an open port, both of which are easily detectable via network scanning.

Impact Assessment

A successful LinkPro infection gives an attacker a persistent, stealthy, and powerful foothold within a compromised Linux environment.

  • Complete System Control: Once activated, the attacker can execute any command as root, allowing them to steal data, deploy other malware (like cryptominers or ransomware), or use the compromised system as a pivot point to attack other parts of the network.
  • Detection Difficulty: The advanced stealth capabilities mean that the rootkit could remain undetected for long periods, allowing attackers to conduct long-term espionage.
  • Cloud Environment Risk: The deployment via a malicious Docker image in a Kubernetes cluster highlights the risk to modern cloud-native environments, where a single compromised container can lead to a widespread breach.

Detection & Response

Detecting eBPF-based rootkits is challenging and requires specialized tools.

  1. eBPF Monitoring: Use tools specifically designed to monitor eBPF activity on a system. Tools like bpftool can be used to list loaded eBPF programs and the kernel functions they are attached to. Look for unknown or suspicious eBPF programs.
  2. Kernel Integrity Monitoring: Use kernel runtime security tools that can detect hooking of kernel functions or other forms of tampering at the kernel level.
  3. Network Analysis: While the magic packet is designed to be stealthy, deep packet inspection might be able to identify network traffic that doesn't conform to expected patterns, although this is very difficult.
  4. IOC Sweeping: Scan for the file-based indicators of the LinkPro rootkit if they are known.

Mitigation

  1. Patch Management: The initial access vector was a known vulnerability. Promptly patching internet-facing services like Jenkins is the most effective way to prevent this attack chain from starting. This is an application of D3FEND Software Update (D3-SU).
  2. Container Security: Implement container security best practices. Do not run containers as root. Use trusted, minimal base images. Scan Docker images for vulnerabilities and malware before deployment.
  3. Restrict eBPF: On systems where it is not needed, consider disabling the ability to load new eBPF programs by setting the kernel.unprivileged_bpf_disabled sysctl parameter. This is a strong hardening measure but may break legitimate monitoring tools.
  4. Least Privilege: Ensure that services like Jenkins run with the minimum necessary privileges and are isolated from the rest of the environment.

Timeline of Events

1
October 16, 2025
This article was published

MITRE ATT&CK Mitigations

Promptly patching the vulnerable Jenkins server would have prevented the initial access for this attack.

Mapped D3FEND Techniques:

Running web services like Jenkins in isolated containers with minimal privileges can limit the impact of a compromise.

Mapped D3FEND Techniques:

Hardening the Linux kernel by disabling unprivileged eBPF can prevent this class of rootkit from being loaded.

Mapped D3FEND Techniques:

Specialized Linux security tools that can monitor kernel activity and eBPF usage are required to detect this type of threat.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To proactively defend against eBPF-based rootkits like LinkPro, harden the Linux kernel on your servers. The most effective step is to disable the use of unprivileged eBPF by setting the sysctl parameter kernel.unprivileged_bpf_disabled to 1. This prevents non-root users from loading eBPF programs, which is a common vector. For systems requiring eBPF for legitimate monitoring (e.g., observability tools), this may not be feasible. In such cases, use a security module like AppArmor or SELinux to create strict policies that define which specific applications are allowed to use the bpf() system call. This prevents unauthorized processes, like a webshell spawned from a compromised Jenkins server, from loading malicious eBPF programs.

For detection, deploy a runtime security tool that is eBPF-aware. Solutions like Falco, Tracee, or commercial Cloud Workload Protection Platforms (CWPP) can monitor kernel activity and detect the loading of suspicious eBPF programs. Configure these tools to alert on any new eBPF program being loaded onto a production server. You can use the bpftool utility to periodically dump the list of loaded eBPF programs and compare it against a known-good baseline. An alert on a new, unapproved eBPF program, especially one attached to sensitive kernel functions (kprobes) or raw network sockets (XDP), is a strong indicator of a rootkit like LinkPro and should be investigated immediately.

While detecting the rootkit is complex, preventing the initial intrusion is straightforward. The entire attack chain began with the exploitation of a known vulnerability, CVE-2024-23897, in a public-facing Jenkins server. Organizations must have a rigorous patch management program for all internet-exposed services. Use vulnerability scanners to continuously assess your external attack surface and identify missing patches. For a critical service like Jenkins, patches for remote code execution vulnerabilities should be applied within days, not weeks. This preventative measure is the most cost-effective way to defend against this threat, as it blocks the attacker at the very first step.

Sources & References

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
The Hacker News (thehackernews.com) October 16, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

LinkProLinuxRootkiteBPFMalwareCloud SecurityAWSJenkinsDocker

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading