Linux rootkits advance with eBPF and io_uring techniques

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

Linux rootkits have emerged as a significant threat to modern infrastructure, particularly with the growing adoption of Linux in cloud environments, container orchestration, IoT devices, and high-performance computing. Traditionally focused on Windows systems, attackers have shifted attention to Linux, developing rootkits that manipulate the operating system to conceal processes, hide files, mask network connections, and suppress their presence in kernel module lists.

A rootkit's primary objective is stealth, allowing prolonged access to high-value targets such as government servers, telecom infrastructure, and cloud providers without triggering alerts. Elastic Security Labs' researchers traced this progression through generations: from early 2000s shared-object hijacking, to loadable kernel module (LKM) implants, and now to eBPF-based and io_uring-powered evasion techniques.

Real-world examples include TripleCross, Boopkit, and RingReaper, documented in 2025. eBPF, originally designed as a safe in-kernel virtual machine for packet filtering and tracing, enables attackers to hook syscalls and intercept kernel events without loading traditional modules. This bytecode passes through the kernel's verifier and is JIT-compiled, appearing legitimate. eBPF programs attach to syscall entry tracepoints or Linux Security Module (LSM) hooks for visibility into processes, files, and networks.

io_uring, introduced in Linux 5.1 for high-performance asynchronous I/O, allows batching of operations via shared memory rings, reducing observable syscall events. This blinds endpoint detection and response (EDR) tools reliant on syscall monitoring.

Traditional tools like rkhunter and chkrootkit fail against these, as eBPF implants do not appear in /proc/modules and bypass Secure Boot. Elastic recommends monitoring anomalous io_uring_enter and io_uring_register syscalls, auditing loaded eBPF programs, using memory forensics, kernel integrity checks, and sub-OS telemetry. Organizations should enforce kernel lockdown, module signing, and updates beyond version 6.9, which disrupts older hooking methods.

Makala yanayohusiana

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Picha iliyoundwa na AI

Researchers discover SSHStalker botnet infecting Linux servers

Imeripotiwa na AI Picha iliyoundwa na AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Phoronix has reported on updated Linux patches aimed at managing out-of-memory behavior through BPF technology. These developments focus on improving how the Linux kernel handles memory shortages. The updates are part of ongoing efforts in open-source Linux advancements.

Imeripotiwa na AI

Researchers have used artificial intelligence to identify a significant performance boost in Linux's IO_uring subsystem. The discovery reveals a 50-80x improvement in efficiency. This finding highlights AI's role in optimizing open-source software.

Linus Torvalds has announced that the Linux kernel will jump to version 7.0 after the 6.x series concludes, marking a cosmetic but symbolic milestone for the open-source project. The decision follows established versioning practices to keep minor numbers manageable, with no major technical overhaul tied to the change. Ongoing developments include expanded Rust integration and hardware support enhancements.

Imeripotiwa na AI

Developers have released Linux kernel 7.0, featuring improvements for Intel and AMD hardware, enhanced storage handling, and the removal of the experimental label from Rust support. Linus Torvalds announced the update, which is not a long-term support version. The release includes preparations for upcoming CPUs and GPUs, alongside self-healing filesystem capabilities.

Jumatatu, 6. Mwezi wa nne 2026, 12:46:25

Linux kernel patch proposes detecting malicious USB devices

Jumatano, 4. Mwezi wa tatu 2026, 07:00:22

Linux prepares IBPB-on-entry feature for AMD SEV-SNP VMs

Jumamosi, 21. Mwezi wa pili 2026, 18:58:27

Linux 7.0 kernel merges several enhancements

Alhamisi, 19. Mwezi wa pili 2026, 13:36:25

Researchers uncover new SysUpdate malware variant targeting Linux

Jumamosi, 14. Mwezi wa pili 2026, 06:39:37

SSHStalker botnet uses IRC to target Linux servers

Jumanne, 10. Mwezi wa pili 2026, 19:39:23

New Linux botnet SSHStalker uses IRC for command-and-control

Ijumaa, 30. Mwezi wa kwanza 2026, 21:23:53

Researchers uncover ShadowHS Linux exploitation framework

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa