TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow

55 pointsby afrcncalmost 3 years ago

7 comments

netsec_burnalmost 3 years ago
This is the same company that wasn&#x27;t aware that LD_PRELOAD has been in use since the 90&#x27;s in their last post. Here is that unique method of hijacking execution flow using &#x2F;etc&#x2F;ld.so.preload, 20 years ago: <a href="https:&#x2F;&#x2F;seclists.org&#x2F;incidents&#x2F;2002&#x2F;Jan&#x2F;86" rel="nofollow">https:&#x2F;&#x2F;seclists.org&#x2F;incidents&#x2F;2002&#x2F;Jan&#x2F;86</a>. None of this is unique or novel, including replacing the loader. LD_PRELOAD rootkits have severe drawbacks (which are not an issue for eBPF rootkits).
评论 #32019363 未加载
评论 #32019669 未加载
评论 #32022384 未加载
pdonisalmost 3 years ago
How is this thing supposed to get installed on a Linux machine?
评论 #32025932 未加载
评论 #32021096 未加载
bigntallmikealmost 3 years ago
Would love to see these researchers comment on whether their new favourite exploit can bypass selinux or other MAC systems. I know a lot of lazy admins don&#x27;t bother but if selinux will protect you, wouldn&#x27;t you want to know?
badrabbitalmost 3 years ago
Avoid using Glibc or patch-out LD_PRELOAD unless you need it. I don&#x27;t mean as a response to this one threat but in general it seems to be the go to hooking mechanism. With this measure and signed kernel module loading enforcement with secureboot you can make it more hostile for untargeted malware to succeed in persisting or installing a rootkit.
评论 #32025955 未加载
hopplaalmost 3 years ago
Enjoyable article.<p>I am fairly confident that this rootkit would be detected by rkhunter, but possibly only when the adversary is logged into the machine, as the malware hides the pids and network ports associated with their ssh connection.
puffoflogicalmost 3 years ago
Fun fact: essentially all of the described exploits are entirely dependent on dynamic linking, which is something no sane modern OS should support. Thanks Drepper!
评论 #32086358 未加载
smspfalmost 3 years ago
Nice read, I wonder how this was detected though. Did it trigger any alarms on the infected machine? Was a firewall or specialized traffic inspection involved?