[Intel]: https://elastic.github.io/security-research/intelligence/2022/05/04.bpfdoor/article/ #432
Labels
missing:tag:Auditd
missing:tag:eBPF
missing:tag:Non-persistentStorage
missing:tag:T1005
missing:tag:T1007
missing:tag:T1021.002
missing:tag:T1037
missing:tag:T1048
missing:tag:T1053.006
missing:tag:T1057
missing:tag:T1070.004
missing:tag:T1071.001
missing:tag:T1083
missing:tag:T1491
missing:tag:T1543.002
missing:tag:T1546.004
missing:tag:T1562.001
missing:tag:T1562.004
missing:tag:T1567
missing:tag:T1573
missing:tag:T1590
new
Area
Malware reports
Parent threat
Persistence, Defense Evasion, Command and Control
Finding
https://elastic.github.io/security-research/intelligence/2022/05/04.bpfdoor/article/
Industry reference
attack:T1205.002:Socket Filters
attack:T1036:Masquerading
attack:T1070:Indicator Removal on Host
attack:T1205:Traffic Signaling
Malware reference
#420
#418
BPFDoor
Tricephalic Hellkeeper
Unix.Backdoor.RedMenshen
JustForFun
Actor reference
DecisiveArchitect
Component
Linux
Scenario
No response
The text was updated successfully, but these errors were encountered: