Linux rootkits advance with eBPF and io_uring techniques

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

Linux rootkits have emerged as a significant threat to modern infrastructure, particularly with the growing adoption of Linux in cloud environments, container orchestration, IoT devices, and high-performance computing. Traditionally focused on Windows systems, attackers have shifted attention to Linux, developing rootkits that manipulate the operating system to conceal processes, hide files, mask network connections, and suppress their presence in kernel module lists.

A rootkit's primary objective is stealth, allowing prolonged access to high-value targets such as government servers, telecom infrastructure, and cloud providers without triggering alerts. Elastic Security Labs' researchers traced this progression through generations: from early 2000s shared-object hijacking, to loadable kernel module (LKM) implants, and now to eBPF-based and io_uring-powered evasion techniques.

Real-world examples include TripleCross, Boopkit, and RingReaper, documented in 2025. eBPF, originally designed as a safe in-kernel virtual machine for packet filtering and tracing, enables attackers to hook syscalls and intercept kernel events without loading traditional modules. This bytecode passes through the kernel's verifier and is JIT-compiled, appearing legitimate. eBPF programs attach to syscall entry tracepoints or Linux Security Module (LSM) hooks for visibility into processes, files, and networks.

io_uring, introduced in Linux 5.1 for high-performance asynchronous I/O, allows batching of operations via shared memory rings, reducing observable syscall events. This blinds endpoint detection and response (EDR) tools reliant on syscall monitoring.

Traditional tools like rkhunter and chkrootkit fail against these, as eBPF implants do not appear in /proc/modules and bypass Secure Boot. Elastic recommends monitoring anomalous io_uring_enter and io_uring_register syscalls, auditing loaded eBPF programs, using memory forensics, kernel integrity checks, and sub-OS telemetry. Organizations should enforce kernel lockdown, module signing, and updates beyond version 6.9, which disrupts older hooking methods.

Liittyvät artikkelit

Illustration of Linux kernel 6.19 release with Tux penguin, scheduling enhancements, Microsoft C extensions, and collaborating tech giants for a news article.
AI:n luoma kuva

Linux kernel 6.19 adds scheduling enhancements and Microsoft C extensions

Raportoinut AI AI:n luoma kuva

The upcoming Linux kernel 6.19 introduces key improvements to the sched_ext framework for better eBPF scheduler recovery and integrates Microsoft C extensions for cleaner code compilation. These updates aim to enhance stability, performance, and developer efficiency in various computing environments. Contributions from companies like Google, Meta, and Microsoft highlight growing collaboration in open-source development.

Expanding on early Phoronix reports, Linux kernel 7.0 will replace linked lists with hash tables in IO_uring's IOPOLL for O(1) lookups, targeting major throughput gains in async I/O for servers and databases.

Raportoinut AI

Phoronix has reported on updated Linux patches aimed at managing out-of-memory behavior through BPF technology. These developments focus on improving how the Linux kernel handles memory shortages. The updates are part of ongoing efforts in open-source Linux advancements.

Security researchers at Check Point have uncovered VoidLink, a sophisticated new Linux malware framework designed to target cloud infrastructures. Written in Zig and linked to Chinese developers, it features over 30 plugins for stealthy reconnaissance, credential theft, and lateral movement. No real-world infections have been observed yet, but its capabilities signal a growing threat to enterprise cloud environments.

Raportoinut AI

A new analysis of 20 years of Linux kernel development reveals that bugs often remain undetected for years, with an average lifespan of 2.1 years before discovery. The research, conducted by Pebblebed's Jenny Guanni Qu, highlights variations across kernel components and the prevalence of incomplete fixes. Some vulnerabilities persisted for over two decades.

At the NDSS 2025 conference, Hengkai Ye and Hong Hu from The Pennsylvania State University presented a paper on subtle vulnerabilities in Linux systems that reintroduce executable stacks. Their work highlights how developers, including security experts, accidentally disable protections against code injection attacks. The study examines tools and system components to reveal gaps in enforcing write-xor-execute policies.

Raportoinut AI

The latest version of QEMU, 10.2, has been released. This update introduces support for IO_uring to enhance performance.

 

 

 

Tämä verkkosivusto käyttää evästeitä

Käytämme evästeitä analyysiä varten parantaaksemme sivustoamme. Lue tietosuojakäytäntömme tietosuojakäytäntö lisätietoja varten.
Hylkää