|
You are here |
intezer.com | ||
| | | | |
www.wiz.io
|
|
| | | | | Dynamic linker hijacking via LD_PRELOAD is a Linux rootkit technique utilized by different threat actors in the wild. In part one of this series on Linux rootkits, we discuss this threat and explain how to detect it. | |
| | | | |
www.welivesecurity.com
|
|
| | | | | In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers. It is built to steal OpenSSH credentials and maintain access to a compromised server. | |
| | | | |
cyble.com
|
|
| | | | | Cyble analyzes stealthy and sophisticated malware capable of bypassing Chrome's app-bound encryption via dual injection techniques. | |
| | | | |
www.halfdog.net
|
|
| | | On Ubuntu Wily it is possible to place an USERNS overlayfs mount over a fuse (file system in userspace) mount. The fuse filesystem may contain SUID binaries, but those cannot be executed due to nosuid mount options. But when touching such an SUID binary via overlayfs mount, this will trigger copy_up including all file attributes, thus creating a real SUID binary on the disk. | ||