Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New FlipSwitch Hooking Technique Bypasses Linux Kernel Defenses

Posted on October 1, 2025October 1, 2025 By CWS

The cybersecurity panorama witnessed the emergence of a classy rootkit variation, FlipSwitch, concentrating on trendy Linux kernels. First surfacing in late September 2025, FlipSwitch exploits current modifications in syscall dispatching to implant stealthy hooks instantly into kernel code.

Early indicators counsel attackers leverage this novel strategy to evade conventional detection, compromising crucial infrastructure and cloud environments.

As organizations race to patch and monitor their programs, FlipSwitch underscores the evolving cat-and-mouse dynamic between kernel hardening efforts and adversary innovation.

FlipSwitch’s arrival follows the adoption of Linux kernel 6.9, which changed the traditional syscall_table array lookup with a switch-statement dispatch throughout the x64_syscall perform.

Whereas this modification closed off conventional pointer-overwrite strategies, it inadvertently launched a brand new assault floor.

Elastic analysts famous that FlipSwitch takes benefit of this very transformation, carving a path by way of up to date defenses and restoring adversaries’ potential to redirect system calls at will.

Elastic researchers recognized FlipSwitch after observing anomalous syscalls in hardened environments, linking them again to a proof-of-concept module hidden inside authentic kernel modules.

By way of cautious reverse engineering, analysts uncovered the rootkit’s strategy: moderately than tampering with deprecated dispatch tables, FlipSwitch patches the compiled machine code of the x64_syscall dispatcher itself, flipping the hook at runtime with out altering the kernel’s knowledge buildings.

In contrast to prior rootkits that relied on data-structure corruption, FlipSwitch’s mechanism is remarkably exact.

By scanning the uncooked bytes of x64_syscall for the distinctive opcode sample equivalent to the decision instruction invoking a goal syscall, the rootkit locates a single insertion level.

Subsequent, it disables reminiscence write protections on the CPU stage by clearing the WP bit within the CR0 register, overwriting the decision’s relative offset to divert execution right into a malicious callback.

As soon as the malicious code executes, the unique syscall conduct is restored by re-enabling write safety and reverting the offset, leaving minimal forensic artifacts.

An infection Mechanism and Persistence

FlipSwitch achieves preliminary kernel-space foothold by way of a two-stage loader embedded inside a seemingly benign kernel module.

Upon module insertion, the loader leverages a kprobe on a trusted kernel perform to derive the deal with of kallsyms_lookup_name, circumventing its non-exported standing.

With this deal with, the loader obtains tips that could each goal syscalls (e.g., sys_kill) and the x64_syscall dispatcher. It then calls a helper perform to find the exact name instruction:-

static inline void disable_write_protection(void) {
unsigned lengthy cr0 = read_cr0();
write_cr0(cr0 & ~X86_CR0_WP);
}

static inline void enable_write_protection(void) X86_CR0_WP);

void apply_flipswitch_hook(void *dispatcher, unsigned lengthy goal) {
disable_write_protection();
// Overwrite 4-byte offset at hook_offset to level to fake_kill
*(int32_t *)(dispatcher + hook_offset + 1) = calc_relative(goal, hook_offset);
enable_write_protection();
}

After patching, FlipSwitch unloads its loader, restoring the kernel’s write-protection settings and leaving solely the modified instruction in reminiscence.

This two-stage course of ensures each stealth and persistence: the loader’s footprint vanishes after execution, and the hook stays lively till the kernel module is eliminated or the system reboots.

FlipSwitch’s growth highlights the necessity for superior memory-integrity monitoring and the continued evolution of in-kernel safety mechanisms.

As defenders adapt, rootkit authors will probably search new avenues to subvert them, reinforcing the crucial for layered detection and proactive menace searching.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Bypasses, Defenses, FlipSwitch, Hooking, Kernel, Linux, Technique

Post navigation

Previous Post: New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records
Next Post: New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks

Related Posts

Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System Cyber Security News
North Korean Kimsuky Hackers Data Breach Cyber Security News
CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks Cyber Security News
Hackers Behind $100 Million Romance Scams and Other Frauds Extradited to US Cyber Security News
CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks Cyber Security News
Beware of Weaponized Wedding Invite Scams That Deploys SpyMax RAT on Android Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark