Flutterby™! : Reverse engineering Linux malware

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

Reverse engineering Linux malware

2025-12-05 17:50:42.104725+01 by Dan Lyke 0 comments

LinkPro: eBPF rootkit analysis

LinkPro targets GNU/Linux systems and is developed in Golang. The Synacktiv CSIRT names it LinkPro in reference to the symbol defining its main module: github.com/link-pro/link-client. The GitHub account link-pro has no public repositories or contributions. LinkPro uses eBPF technology to only activate upon receiving a "magic packet", and to conceal itself on the compromised system.

(eBPF is the "extended Berkeley Packet Filter")

[ related topics: Free Software Open Source Bay Area Clowns ]

comments in descending chronological order (reverse):

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net.