Jul 05, 2023 • Wiz Security Research
Linux rootkits explained – Part 1: Dynamic linker hijacking
This article introduces dynamic linker hijacking via the LD_PRELOAD environment variable, a prevalent technique employed by various threat actors to establish...
Executive Summary
This article introduces dynamic linker hijacking via the LD_PRELOAD environment variable, a prevalent technique employed by various threat actors to establish persistence and evade detection on Linux systems. By manipulating the dynamic linker, adversaries can force the loading of malicious libraries before legitimate ones, effectively hiding rootkit functionality within trusted processes. This method poses a significant risk to server integrity and data security, allowing unauthorized access and prolonged compromise. The report emphasizes the importance of detecting such anomalies through monitoring system calls and library loads. Mitigation strategies include rigorous file integrity monitoring, restricting environment variable modifications, and employing specialized rootkit detection tools. Understanding this mechanism is crucial for security teams to harden Linux environments against advanced persistent threats leveraging execution flow hijacking for stealthy operations.
Summary
Dynamic linker hijacking via LD_PRELOAD is a Linux rootkit technique utilized by different threat actors in the wild. In part one of this series on Linux rootkits, we discuss this threat and explain how to detect it.
Published Analysis
This article introduces dynamic linker hijacking via the LD_PRELOAD environment variable, a prevalent technique employed by various threat actors to establish persistence and evade detection on Linux systems. By manipulating the dynamic linker, adversaries can force the loading of malicious libraries before legitimate ones, effectively hiding rootkit functionality within trusted processes. This method poses a significant risk to server integrity and data security, allowing unauthorized access and prolonged compromise. The report emphasizes the importance of detecting such anomalies through monitoring system calls and library loads. Mitigation strategies include rigorous file integrity monitoring, restricting environment variable modifications, and employing specialized rootkit detection tools. Understanding this mechanism is crucial for security teams to harden Linux environments against advanced persistent threats leveraging execution flow hijacking for stealthy operations. Dynamic linker hijacking via LD_PRELOAD is a Linux rootkit technique utilized by different threat actors in the wild. In part one of this series on Linux rootkits, we discuss this threat and explain how to detect it. Dynamic linker hijacking via LD_PRELOAD is a Linux rootkit technique utilized by different threat actors in the wild. In part one of this series on Linux rootkits, we discuss this threat and explain how to detect it.