👩💻 Join our community of thousands of amazing developers!
Overview Recently I heard about a new malware called Symbiote, which the researches are calling the “Nearly-Impossible-to-Detect Linux Threat”. I was very intrigued by how that malware is being implemented and how it works internally to remain undetected, so naturally I’ve started to research it. I highly advise you to read through these articles first before we begin with the actual post: Hijack Execution Flow: Dynamic Linker Hijacking What Is the LD_PRELOAD? What is a Shared Library? Im...