Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses

Posted on October 1, 2025October 1, 2025 By CWS

The cybersecurity panorama witnessed the emergence of a classy rootkit variation, FlipSwitch, concentrating on trendy Linux kernels. First surfacing in late September 2025, FlipSwitch exploits current modifications in syscall dispatching to implant stealthy hooks instantly into kernel code.

Early indicators counsel attackers leverage this novel strategy to evade conventional detection, compromising crucial infrastructure and cloud environments.

As organizations race to patch and monitor their programs, FlipSwitch underscores the evolving cat-and-mouse dynamic between kernel hardening efforts and adversary innovation.

FlipSwitch’s arrival follows the adoption of Linux kernel 6.9, which changed the traditional syscall_table array lookup with a switch-statement dispatch throughout the x64_syscall perform.

Whereas this modification closed off conventional pointer-overwrite strategies, it inadvertently launched a brand new assault floor.

Elastic analysts famous that FlipSwitch takes benefit of this very transformation, carving a path by way of up to date defenses and restoring adversaries’ potential to redirect system calls at will.

Elastic researchers recognized FlipSwitch after observing anomalous syscalls in hardened environments, linking them again to a proof-of-concept module hidden inside authentic kernel modules.

By way of cautious reverse engineering, analysts uncovered the rootkit’s strategy: moderately than tampering with deprecated dispatch tables, FlipSwitch patches the compiled machine code of the x64_syscall dispatcher itself, flipping the hook at runtime with out altering the kernel’s knowledge buildings.

In contrast to prior rootkits that relied on data-structure corruption, FlipSwitch’s mechanism is remarkably exact.

By scanning the uncooked bytes of x64_syscall for the distinctive opcode sample equivalent to the decision instruction invoking a goal syscall, the rootkit locates a single insertion level.

Subsequent, it disables reminiscence write protections on the CPU stage by clearing the WP bit within the CR0 register, overwriting the decision’s relative offset to divert execution right into a malicious callback.

As soon as the malicious code executes, the unique syscall conduct is restored by re-enabling write safety and reverting the offset, leaving minimal forensic artifacts.

An infection Mechanism and Persistence

FlipSwitch achieves preliminary kernel-space foothold by way of a two-stage loader embedded inside a seemingly benign kernel module.

Upon module insertion, the loader leverages a kprobe on a trusted kernel perform to derive the deal with of kallsyms_lookup_name, circumventing its non-exported standing.

With this deal with, the loader obtains tips that could each goal syscalls (e.g., sys_kill) and the x64_syscall dispatcher. It then calls a helper perform to find the exact name instruction:-

static inline void disable_write_protection(void) {
unsigned lengthy cr0 = read_cr0();
write_cr0(cr0 & ~X86_CR0_WP);
}

static inline void enable_write_protection(void) X86_CR0_WP);

void apply_flipswitch_hook(void *dispatcher, unsigned lengthy goal) {
disable_write_protection();
// Overwrite 4-byte offset at hook_offset to level to fake_kill
*(int32_t *)(dispatcher + hook_offset + 1) = calc_relative(goal, hook_offset);
enable_write_protection();
}

After patching, FlipSwitch unloads its loader, restoring the kernel’s write-protection settings and leaving solely the modified instruction in reminiscence.

This two-stage course of ensures each stealth and persistence: the loader’s footprint vanishes after execution, and the hook stays lively till the kernel module is eliminated or the system reboots.

FlipSwitch’s growth highlights the necessity for superior memory-integrity monitoring and the continued evolution of in-kernel safety mechanisms.

As defenders adapt, rootkit authors will probably search new avenues to subvert them, reinforcing the crucial for layered detection and proactive menace searching.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Bypasses, Defenses, FlipSwitch, Hooking, Kernel, Linux, Technique

Post navigation

Previous Post: New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records
Next Post: New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks

Related Posts

Firefox 141 Released With Fix for Multiple Vulnerabilities Cyber Security News
Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Cyber Security News
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon Cyber Security News
New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News
Akira and Lynx Ransomware Attacking Managed Service Providers With Stolen Login Credential and Vulnerabilities Cyber Security News
Network Intrusion Detection for Emerging 2025 Cyber Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News