Rootkits have long been a pain in the neck to servers. These collections of malicious programs would hide on servers while allowing their controllers’ administrator-level access to a computer or network.

So, it comes as no surprise that Aqua’s Team Nautilus has found many attackers using advanced persistent threat (APT) techniques to plant rootkits in cloud native containers.

Once in, they remain hidden, and your uninvited visitor grabs data or sets up malware for a bigger, better attack.

And, of course, “rootkits can be used to override functions or binaries in userspace (for example, using LD_PRELOAD).”

Related Articles