News

Uses and abuses of eBPF: threats, detection techniques and countermeasures - Part 1

Originally designed to optimise the performance of Linux systems, the eBPF (extended Berkeley Packet Filter) has rapidly established itself as a strategic component in computer security. 

Versatility, execution privileges and code verification make eBPF an extremely useful tool for collecting detailed information in real time, without compromising the stability of the kernel. However, it is precisely these characteristics that make it a particularly suitable technology for the realisation of malicious implantssuch as the rootkit. 

With the increasing adoption of eBPFs in tools for monitoring, networking and runtime protection, the available attack surface is progressively widening and the risk of abuse is no longer theoretical, but concretely applicable, especially in environments containerised and multi-tenant. 

Next’s new DFIR study thus opens a series of publications dedicated to the analysis of eBPF abuse in an offensive context, with the aim of: 

  • explore the malicious potential of eBPF programmes; 
  • outline possible detection and mitigation methodologies; 
  • present techniques and tools useful for DFIR teams and SOC centres to detect eBPF rootkit activities.

 

In this first publication, we offer a theoretical overview of scenarios in which the offensive use of eBPF offers concrete advantages to malicious actors, with references to academic studies and malware used in real-life activities. 

If you wish to learn more, here is the link to our comprehensive study. 

In addition, you can subscribe to the specific mailing list Cyber Studios by Tinexta Defenceto receive updates on upcoming research: 

https://tinextadefence.it/mailing-list-cyber-studios/

Share:

Degree in Business Administration from the University of Naples 'Federico II' with an MBA in Business Management achieved with high merit in 2008 by winning a scholarship provided by Invitalia S.p.A. from which she was selected in the first months of attendance as the best MBA profile.

After a brief experience in Invitalia S.p.A., he immediately held increasingly important roles in the management of Administration, Finance and Control of companies operating in the defence sector, theInformation Technology, of Cyber and National Security. In addition, she was Treasury Manager in companies operating in theEnergy.

He obtained an Executive Master in Finance (EMF) at SDA Bocconi in 2020, with a specialisation in Corporate Finance & Control and, in 2022, a further specialisation track in Asset, Wealth Management also at SDA Bocconi.

For over five years it has been the Chief Financial Officer of the Defence Tech Group, whose listing process he followed on the Euronext Growth Milan segment of Borsa Italiana.

From 2017 to 2024, she was a member of the boards of directors of all the legal entity of the Defence Tech Group with delegated powers over their financial management and from October 2021 to October 2024 was a Board Member of the Holding Company.

It is currently also Investor Relations Manager of the listed Defence Tech and follows all ESG issues of the Group.

In July 2021, she was recognised by Federmanager as one of the best talents under 44 at national level, receiving an important award as Young Manager 2020.