Extended Berkeley Packet Filter (eBPF) represents one of Linux’s most powerful kernel technologies, enabling users to load sandboxed programs directly into the kernel for network packet inspection and system call monitoring.
Introduced in 2015 to modernize the 1992 BPF architecture, this capability has become a double-edged sword providing unprecedented observability while simultaneously offering sophisticated attackers a stealthy new attack vector.
Malware authors quickly recognized eBPF’s potential, with the Bvp47 backdoor emerging in 2015, followed by rootkits like Ebpfkit and TripleCross.
However, the technical complexity required to weaponize eBPF has kept such malware relatively rare. Today, the threat landscape is dominated by two families that first appeared in 2021: Symbiote and BPFDoor.
FortiGuard Labs detection data reveals that eBPF malware remains an active threat in 2025, with 151 new BPFDoor samples and three Symbiote variants identified this year alone.
While these numbers pale compared to commodity malware, eBPF-based threats occupy a specialized niche reserved for sophisticated actors.
The development expertise required places them in the realm of advanced persistent threats, with BPFDoor specifically attributed to state-sponsored operations.
Technical Evolution
Recent Symbiote variants demonstrate significant tactical evolution. Analysis of a July 2025 sample reveals enhanced BPF filters that now accept IPv4 and IPv6 packets across TCP, UDP, and SCTP protocols on eight non-standard ports: 54778, 58870, 59666, 54879, 57987, 64322, 45677, and 63227.
This represents a substantial expansion from earlier versions that only accepted TCP and SCTP traffic from a smaller port set.
The expansion serves multiple evasion purposes. Port hopping allows malware to switch ports when one becomes blocked or monitored, while the inclusion of UDP a connectionless protocol complicates detection since traditional intrusion detection systems are optimized for TCP handshake analysis.
By operating exclusively on high ports, these rootkits bypass security tools focused on well-known service ports.
BPFDoor has similarly evolved. Comparison between 2022 and 2025 variants shows critical enhancements, particularly IPv6 support in BPF filters.
The 2025 sample monitors both IPv4 and IPv6 DNS traffic (port 53), using the ubiquity of DNS queries as camouflage.
The malware attaches BPF filters to raw sockets via SO_ATTACH_FILTER, implementing classic BPF bytecode that filters packets at the kernel level before they reach user space making detection exceptionally difficult.
Reverse Engineering and AI-Assisted Analysis
Analyzing eBPF malware presents unique challenges. BPF uses a minimal instruction set architecture with fixed-size 64-bit instructions, fundamentally different from x86 or ARM.

While tools like Radare2, IDA Pro plugins, and Capstone engine support BPF disassembly, interpreting the bytecode requires specialized knowledge.
AI models have produced critical errors, such as misinterpreting packet acceptance as dropping, or confusing EtherType values (0x0800 for IPv4) with port numbers. These mistakes underscore the necessity of human verification.
Artificial intelligence is emerging as a valuable aid in this process. Researchers using Claude Sonnet 4.5 to analyze BPF bytecode reported rapid comprehension of packet filtering logic, though with important caveats.
An MCP server integration for Radare2 demonstrates the potential of AI-assisted reverse engineering, with large language models generating comprehensive markdown analyses for approximately $0.50 per sample.
The automated comparison of 2022 and 2025 BPFDoor variants correctly identified IPv6 support and packet identification mechanism changes, though it hallucinated the presence of RC4 encryption that manual analysis could not verify.
The 2025 variants confirm that eBPF malware authors actively enhance their tools to evade detection.
Symbiote’s expanded port list and UDP support, combined with BPFDoor’s IPv6 capabilities and DNS traffic camouflage, represent calculated responses to modern network monitoring practices.
These developments necessitate evolution in defensive strategies, including comprehensive high-port monitoring, IPv6-aware detection engines, and specialized eBPF security frameworks.
For defenders, the takeaway is clear: eBPF malware is not a historical curiosity but an evolving threat requiring dedicated detection capabilities and reverse engineering expertise.
As AI tools lower the barrier for analysis, critical thinking and manual verification remain indispensable in separating fact from algorithmic hallucination.
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.
