κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses
άμυνα
.

New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses

01/10/2025

The cybersecurity landscape witnessed the emergence of a sophisticated rootkit variation, FlipSwitch, targeting modern Linux kernels. First surfacing in late September 2025, FlipSwitch exploits recent changes in syscall dispatching to implant stealthy hooks directly into kernel code.

Early indicators suggest attackers leverage this novel approach to evade traditional detection, compromising critical infrastructure and cloud environments.

As organizations race to patch and monitor their systems, FlipSwitch underscores the evolving cat-and-mouse dynamic between kernel hardening efforts and adversary innovation.

FlipSwitch’s arrival follows the adoption of Linux kernel 6.9, which replaced the classic syscall_table array lookup with a switch-statement dispatch within the x64_syscall function.

While this change closed off traditional pointer-overwrite methods, it inadvertently introduced a new attack surface.

Elastic analysts noted that FlipSwitch takes advantage of this very transformation, carving a path through updated defenses and restoring adversaries’ ability to redirect system calls at will.

Elastic researchers identified FlipSwitch after observing anomalous syscalls in hardened environments, linking them back to a proof-of-concept module hidden within legitimate kernel modules.

Through careful reverse engineering, analysts uncovered the rootkit’s approach: rather than tampering with deprecated dispatch tables, FlipSwitch patches the compiled machine code of the x64_syscall dispatcher itself, flipping the hook at runtime without altering the kernel’s data structures.

Unlike prior rootkits that relied on data-structure corruption, FlipSwitch’s mechanism is remarkably precise.

By scanning the raw bytes of x64_syscall for the unique opcode pattern corresponding to the call instruction invoking a target syscall, the rootkit locates a single insertion point.

Next, it disables memory write protections at the CPU level by clearing the WP bit in the CR0 register, overwriting the call’s relative offset to divert execution into a malicious callback.

Once the malicious code executes, the original syscall behavior is restored by re-enabling write protection and reverting the offset, leaving minimal forensic artifacts.

Infection Mechanism and Persistence

FlipSwitch achieves initial kernel-space foothold through a two-stage loader embedded within a seemingly benign kernel module.

Upon module insertion, the loader leverages a kprobe on a trusted kernel function to derive the address of kallsyms_lookup_name, circumventing its non-exported status.

With this address, the loader obtains pointers to both target syscalls (e.g., sys_kill) and the x64_syscall dispatcher. It then calls a helper function to locate the precise call instruction:-

static inline void disable_write_protection(void) {
unsigned long cr0 = read_cr0();
write_cr0(cr0 & ~X86_CR0_WP);
}

static inline void enable_write_protection(void) {
unsigned long cr0 = read_cr0();
write_cr0(cr0 | X86_CR0_WP);
}

void apply_flipswitch_hook(void *dispatcher, unsigned long target) {
disable_write_protection();
// Overwrite 4-byte offset at hook_offset to point to fake_kill
*(int32_t *)(dispatcher + hook_offset + 1) = calc_relative(target, hook_offset);
enable_write_protection();
}

After patching, FlipSwitch unloads its loader, restoring the kernel’s write-protection settings and leaving only the modified instruction in memory.

This two-stage process ensures both stealth and persistence: the loader’s footprint vanishes after execution, and the hook remains active until the kernel module is removed or the system reboots.

FlipSwitch’s development highlights the need for advanced memory-integrity monitoring and the continued evolution of in-kernel security mechanisms.

As defenders adapt, rootkit authors will doubtless seek new avenues to subvert them, reinforcing the imperative for layered detection and proactive threat hunting.

Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

Source: cybersecuritynews.com

Filed Under: INDUSTRY NEWS Tagged With: Source-10

3 ways I make NotebookLM my personal sidekick

NotebookLM is marketed as a research and notes companion, but honestly, I don’t quite use it the way Google had intended. The “official” pitch is that you upload documents, and it helps you pull insights and keep track of sources. This is undoubtedly useful for things like academic work, but it can also get boring if that’s all you use it for. Source: xda-developers.com … [Read More...]

I didn't know the Obsidian Reminder plugin existed, but it's exactly what I needed

I run my entire life out of my Obsidian vault, but until now, something has been missing. I've tried multiple to-do apps, but none of those really checked all the boxes — and then I stumbled across the Obsidian Reminder plugin. This small, simple plugin has become an essential part of my workflow. I already struggle to remember things — if it isn't written down, it doesn't exist — but with a … [Read More...]

Opera is bringing a huge wave of free AI tools to its browsers

A few days ago, Opera broke the news that my favorite AI browser was getting a general release. It was fantastic news for me, because when I gave their test build out and used it to remake the classic game of Snake, I had a blast experimenting with all the different things I could ask it to do. Source: xda-developers.com … [Read More...]

All the quotes from Borderlands 4 CEO about the game that missed the mark

For a lot of years now, Randy Pitchford, the CEO of Gearbox Entertainment, has been one of the more... interesting personalities in the gaming space. The man certainly has a flair for dramatics, an unfiltered way of talking, and a knack for making headlines for the strangest reasons. Source: xda-developers.com … [Read More...]

4 cheap PC parts I’ll never buy again

Building a PC is an exciting rite of passage for any tech enthusiast. There's an overwhelming breadth of options available at every budget. However, this low barrier to entry is a double-edged sword. It’s incredibly tempting for a novice or first-time PC builder to look at a compatibility list and pair an upper-mid tier CPU and gaming GPU with an affordable $80 motherboard. I've been tempted too, … [Read More...]

I replaced WSL with a full Linux VM, and here’s why it's actually better

Windows Subsystem for Linux, or WSL, has been an incredibly welcome addition to Windows for those who enjoy developing and tinkering with Linux distributions. The lightweight, easy-to-setup nature of these instances is perfect for anyone looking to run Linux tools without needing to leave their primary OS. Once I started to use non-native packages and stepped outside of basic command-line tasks, I … [Read More...]

RGB is secretly the worst bloatware on your PC

If your PC features a lot of RGB lighting, chances are you've got software to manage it. While proprietary RGB software will give you complete control over your lighting, most RGB control software consumes hardware resources to run on a consistent basis. This is especially true of most OEMs' proprietary RGB management software, like Asus Armoury Crate, MSI Center, or Razer Synapse. Source: … [Read More...]

This cute open-source notes app killed Google Keep for me

Google Keep has been my go-to for jotting down quick ideas and making lists. It’s minimal, dead easy to navigate, and also just a tap away on my phone. I love it for its simplicity which allows me to quickly dump half-formed notes. But over time, I started to hit a ceiling. My notes became a messy scroll of colorful squares without folders or real structure. I also wasn’t a fan of my notes being … [Read More...]

The best smart rings for 2025

It’s getting increasingly difficult to say smart rings are just a niche inside the broader world of wearable technology. The raft of celebrities who are seen wearing them, the NBA’s use of Oura rings as an early warning system against COVID-19 and, last year, Samsung’s entry into the market has made them far more prominent in the minds of mainstream consumers. We’ve tested plenty of smart … [Read More...]

The clock is ticking: Savings of up to 20% on group passes end tonight for TechCrunch Disrupt 2025

The Founder and Investor bundle sale for TechCrunch Disrupt 2025 is live — but only until tonight at 11:59 p.m. PT. This is your only chance this year to lock in group bundle savings on Founder Passes and an even bigger discount on group Investor Passes. After today, these deals are gone. Disrupt 2025 brings together over 10,000 founders, investors, and operators from around the world to tackle … [Read More...]

Tags

Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

Tech Web Development News

This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

Tech News

Disclaimer!
In every post is written below the original source of the post. Copyrights belong on their owners.

Web Development News

HOTELS – CRUISES – CARS – TRAVEL

Recent Posts

  • 3 ways I make NotebookLM my personal sidekick
  • I didn't know the Obsidian Reminder plugin existed, but it's exactly what I needed
  • Opera is bringing a huge wave of free AI tools to its browsers
  • All the quotes from Borderlands 4 CEO about the game that missed the mark
  • 4 cheap PC parts I’ll never buy again

Technology - Seo

Categories

  • INDUSTRY NEWS

World Industry News

Privacy & Cookies: This site uses cookies.
To find out more, as well as how to remove or block these, see here: Our Cookie Policy
TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023