article thumbnail

Detecting eBPF Malware with Tracee

Aqua Security

eBPF is a popular and powerful technology embedded in the Linux kernel. Lately, we have seen a rise in the number of eBPF based tools used for malicious goals such as rootkits ( ebpfkit, TripleCross ) and malwares ( pamspy ). It is widely used by many security tools for monitoring kernel activity to detect and protect organizations.

Malware 96
article thumbnail

Hunting Rootkits with eBPF: Detecting Linux Syscall Hooking Using Tracee

Aqua Security

Tracee is an open source runtime security and forensics tool for Linux that is powered by eBPF and is more optimized for secure tracing. In this blog, we’ll explore the ways to control eBPF events and examine a case of using a BPF event to capture rootkits, a sophisticated type of malware that lives in the kernel space.

Linux 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Agentless Workload Scanning Gets Supercharged with Malware Scanning

Prisma Clud

Using WildFire in 2021 to analyze malicious files, our threat research team discovered a 73% increase in Cobalt Strike malware samples compared to 2020. The speed, volume and sophistication of modern malware attacks has made them more difficult to detect.

Malware 76
article thumbnail

PYSA Ransomware Gang adds Linux Support

Lacework

Key Take Aways The first Linux version of ChaChi, a Golang based DNS tunneling backdoor, was recently observed on VirusTotal. The malware is configured to use domains associated with ransomware actors known as PYSA, aka Menipoza Ransomware Gang. The post PYSA Ransomware Gang adds Linux Support appeared first on Lacework.

Linux 134
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. Steg malware is uncommon relative to other malware.

Malware 96
article thumbnail

Detecting Drovorub's File Operations Hooking with Tracee

Aqua Security

This blog was co-authored by Itamar Maouda Two years ago, the NSA (the United States' National Security Agency) revealed that Drovorub, an advanced Russian malware created by the GRU 85th GTsSS team, had been discovered targeting Linux systems. It has an advanced kernel rootkit that hooks several kernel functions.

Linux 139
article thumbnail

What’s Free at Linux Academy — May 2019

Linux Academy

By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month, we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.

Linux 113