Question about malware's ability to hide its network connections #668
Replies: 5 comments 4 replies
-
If we can detect those connections I'd say yes. We rely on the kernel's Netfilter framework, so if the malware doesn't bypass Netfilter then we'd be able to detect those connections. It'd involve enabling
That method would hide connections from showing with
We don't use SocketFilter bpf progs, instead we hook kprobes. And we only use them to get the PID of the process that initiated the connection, no for taking decisions. That said, I don't know if SO_ATTACH_FILTER and BPF_PROG_ATTACH (gobpf ) will follow the same path to ebpf's VM. In any case, since the malware intercepts SO_ATTACH_FILTER and gobpf uses BPF_PROG_ATTACH , maybe we wouldn't be affected on this case.
In the case that we were affected, we wouldn't be able to get the PID of the app that initiated the connection (then we'd try to get it via netlink, then via /proc/net/*). If everything fails, the connection would be : 1) discarded applying the default action configured or 2) we'd prompt the user to allow/deny it.
We don't use libpcap to inspect network traffic 🎉 |
Beta Was this translation helpful? Give feedback.
-
That said, there're othe malwares that hijack netlink connections [0], or that trojanize the iptables binary [1] [2]. That's why I didn't rely on If Intezer says that it's "nearly-impossible-to-detect" I'd surprised if we detected it :) unless the post is a clickbait. [0] |
Beta Was this translation helpful? Give feedback.
-
Thank you @gustavo-iniguez-goya for this very detailed explanation 🙂 |
Beta Was this translation helpful? Give feedback.
-
Just to mention here a new method to exfiltrate data with TCP retransmissions technique to duplicate a packet : The original document : TripleCross/ebpf_offensive_rootkit_tfg.pdf at master · h3xduck/TripleCross |
Beta Was this translation helpful? Give feedback.
-
@NRGLine4Sec A test detonating a miner: #743 |
Beta Was this translation helpful? Give feedback.
-
Hi @gustavo-iniguez-goya
Would OpenSnitch be able to detect the network connections of this malware despite its use of eBPF to hide its network activity ?
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Beta Was this translation helpful? Give feedback.
All reactions