Security researchers at the French firm Synacktiv have discovered a highly sophisticated and stealthy GNU/Linux rootkit named LinkPro. The malware was found during an investigation of a compromised Amazon Web Services (AWS) infrastructure. LinkPro utilizes advanced, modern techniques to evade detection. Its core features include the use of two extended Berkeley Packet Filter (eBPF) modules: one to hook kernel functions and hide its own presence (files, processes, network connections), and another to act as a network sniffer that activates the rootkit only upon receiving a specific "magic packet." This allows the malware to remain completely dormant and invisible on a compromised system until the attacker chooses to activate it. The initial compromise was achieved by exploiting CVE-2024-23897 in a public-facing Jenkins server, followed by the deployment of a malicious Docker image.
The discovery of LinkPro highlights a growing trend of malware authors adopting eBPF to create powerful and evasive rootkits. eBPF allows programs to run in a sandboxed environment within the Linux kernel, making it a powerful tool for both performance monitoring and, in this case, malicious activity.
Attack Chain:
kvlnt/vv onto the victim's Kubernetes clusters. This image, based on Kali Linux, contained the LinkPro rootkit components.ls, ps, and netstat.LinkPro represents a significant step up in Linux rootkit sophistication.
T1190 - Exploit Public-Facing Application (exploiting the Jenkins vulnerability).T1059.004 - Command and Scripting Interpreter: Unix Shell.T1070.004 - Indicator Removal: File Deletion.T1562.001 - Impair Defenses: Disable or Modify Tools.T1222.002 - File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification.T1574.006 - Hijack Execution Flow: Dynamic Linker Hijacking (a traditional rootkit technique, though eBPF is a more modern approach).T1090.002 - Proxy: External Proxy. The magic packet triggers a C2 connection.The use of eBPF is what makes LinkPro so dangerous:
A successful LinkPro infection gives an attacker a persistent, stealthy, and powerful foothold within a compromised Linux environment.
Detecting eBPF-based rootkits is challenging and requires specialized tools.
bpftool can be used to list loaded eBPF programs and the kernel functions they are attached to. Look for unknown or suspicious eBPF programs.kernel.unprivileged_bpf_disabled sysctl parameter. This is a strong hardening measure but may break legitimate monitoring tools.Promptly patching the vulnerable Jenkins server would have prevented the initial access for this attack.
Mapped D3FEND Techniques:
Running web services like Jenkins in isolated containers with minimal privileges can limit the impact of a compromise.
Mapped D3FEND Techniques:
Hardening the Linux kernel by disabling unprivileged eBPF can prevent this class of rootkit from being loaded.
Mapped D3FEND Techniques:
Specialized Linux security tools that can monitor kernel activity and eBPF usage are required to detect this type of threat.
Mapped D3FEND Techniques:
To proactively defend against eBPF-based rootkits like LinkPro, harden the Linux kernel on your servers. The most effective step is to disable the use of unprivileged eBPF by setting the sysctl parameter kernel.unprivileged_bpf_disabled to 1. This prevents non-root users from loading eBPF programs, which is a common vector. For systems requiring eBPF for legitimate monitoring (e.g., observability tools), this may not be feasible. In such cases, use a security module like AppArmor or SELinux to create strict policies that define which specific applications are allowed to use the bpf() system call. This prevents unauthorized processes, like a webshell spawned from a compromised Jenkins server, from loading malicious eBPF programs.
For detection, deploy a runtime security tool that is eBPF-aware. Solutions like Falco, Tracee, or commercial Cloud Workload Protection Platforms (CWPP) can monitor kernel activity and detect the loading of suspicious eBPF programs. Configure these tools to alert on any new eBPF program being loaded onto a production server. You can use the bpftool utility to periodically dump the list of loaded eBPF programs and compare it against a known-good baseline. An alert on a new, unapproved eBPF program, especially one attached to sensitive kernel functions (kprobes) or raw network sockets (XDP), is a strong indicator of a rootkit like LinkPro and should be investigated immediately.
While detecting the rootkit is complex, preventing the initial intrusion is straightforward. The entire attack chain began with the exploitation of a known vulnerability, CVE-2024-23897, in a public-facing Jenkins server. Organizations must have a rigorous patch management program for all internet-exposed services. Use vulnerability scanners to continuously assess your external attack surface and identify missing patches. For a critical service like Jenkins, patches for remote code execution vulnerabilities should be applied within days, not weeks. This preventative measure is the most cost-effective way to defend against this threat, as it blocks the attacker at the very first step.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats