2022 has seen a handful of new or resurfaced Linux rootkits, often touted as “highly stealthy” or “nearly undetectable”. But are they really?
In this webinar, Jace Walker, Threat Hunter/Researcher at Binary Defense, will:
- Walk through different potential detection methods that incident responders can use to decloak or identify common types of Linux rootkits
- Show you clues to look for using Symbiote, OrBit, and Syslogk as examples
- Share some suggested methods for removing Rootkits once they’re found