Back
#239
August 18, 2025

EP239 Linux Security: The Detection and Response Disconnect and Where Is My Agentless EDR

Guest:

Topics:

SIEM and SOC
29:29

Subscribe at Spotify

Subscribe at Apple Podcasts

Subscribe at YouTube

Topics covered:

  • When it comes to Linux environments – spanning on-prem, cloud, and even–gasp–hybrid setups – where are you seeing the most significant blind spots for security teams today? 
  • There's sometimes a perception that Linux is inherently more secure or less of a malware target than Windows. Could you break down some of the fundamental differences in how malware behaves on Linux versus Windows, and why that matters for defenders in the cloud?
  • 'Living off the Land' isn't a new concept, but on Linux, it feels like attackers have a particularly rich set of native tools at their disposal. What are some of the more subtly abused but legitimate Linux utilities you're seeing weaponized in cloud attacks, and how does that complicate detection?
  • When you weigh agent-based versus agentless monitoring in cloud and containerized Linux environments, what are the operational trade-offs and outcome trade-offs security teams really need to consider? 
  • SSH keys are the de facto keys to the kingdom in many Linux environments. Beyond just 'use strong passphrases,' what are the critical, often overlooked, risks associated with SSH key management, credential theft, and subsequent lateral movement that you see plaguing organizations, especially at scale in the cloud?
  • What are the biggest operational hurdles teams face when trying to conduct incident response effectively and rapidly across such a distributed Linux environment, and what's key to overcoming them?

Do you have something cool to share? Some questions? Let us know:

Transcript

Here is a detailed summary of the recent podcast episode featuring Craig Rowland, the Founder and CEO of Sandfly Security. The discussion was co-hosted by Tim Peacock with a brief introduction by Anton Chuvakin. The primary focus of the conversation was on agentless endpoint security, specifically for Linux environments, and the evolving threat landscape for these systems.

Introduction and The Agentless EDR Debate

The episode began with an opening discussion on the concept of agentless EDR. Anton Chuvakin, a former Gartner analyst and an originator of the EDR concept, provided historical context. He noted that in the early days of EDR, there was a significant internal debate among Gartner analysts about whether a product could be considered a true EDR solution without a persistent agent. The key argument against agentless EDR was its inability to collect certain types of real-time telemetry, such as live memory data.

Chuvakin concluded that while there are certainly "cons" to the agentless approach, such as a lack of continuous, real-time visibility, the approach also presents "pros" and can still be considered a valid form of EDR. This established a foundation for the main conversation, setting up the premise that agentless security is a viable and important topic, particularly for the diverse and complex world of Linux.

The Sandfly Story: A Theory of Defense for Linux

Craig Rowland was then introduced and asked to explain his company's approach to Linux security. Rowland's core premise is that "Linux is an umbrella term" that encompasses a vast range of systems, from large cloud GPU clusters to tiny, low-power devices like a Raspberry Pi. He highlighted that a traditional kernel-level agent or eBPF-based solution is often incompatible or difficult to deploy across this wide variety of distributions, kernels, and CPU architectures (Intel, AMD, ARM, MIPS, IBM Power, and IBM S390, etc.).

This technical fragmentation, Rowland explained, led to the development of an agentless solution to achieve "total, complete compatibility" and stability across these diverse environments. The Sandfly approach involves connecting to a system via SSH and running a small, purpose-built Golang binary on demand. This binary performs forensics and collects data about the system's state, which is then analyzed off-host. While this method sacrifices real-time visibility, it gains stability and avoids the risk of an agent interfering with mission-critical systems.

Beyond traditional EDR functions, Sandfly's agentless approach allows for other unique capabilities, including:

SSH key tracking: Monitoring for the movement or misuse of SSH keys.

Password auditing: Identifying weak or exposed passwords.

Drift detection: Spotting any changes to the system's state, such as new processes, users, or services.

The Linux Threat Landscape: A Misunderstood Frontier

Rowland addressed the common misconception that Linux is inherently more secure than Windows, or that it faces fewer threats. He characterized Linux as the "ignored stepchild" of cybersecurity, where security teams are often understaffed and lack the necessary expertise to monitor Linux deployments effectively. He cited a striking example of a three-person team responsible for securing 100,000 Linux VMs.

He further elaborated on the nature of Linux attacks, noting that attackers often leverage the fact that "Linux is a programming language," not just an operating system. This allows them to chain together a series of benign, built-in commands to perform malicious actions, a practice often referred to as "living off the land." The bespoke nature of many Linux deployments also makes it harder for automated ransomware attacks to succeed, forcing attackers to be more custom and patient in their approach.

A significant part of the conversation was dedicated to the threat of stolen credentials and SSH keys. Rowland explained that once an attacker gains a foothold, they will often crawl the system for private keys and SSH configuration files, allowing them to move laterally across the network while appearing as a legitimate user.

He also provided a fascinating example of an advanced nation-state backdoor called BPFDoor, which uses a Berkeley Packet Filter to listen for "magic packets" on a host. Upon receiving a specific packet, it reconfigures the firewall to forward traffic to a hidden shell, making its malicious communication appear as legitimate traffic on a commonly used port like 443.

Trade-offs and The Role of AI in Linux Security

The discussion then pivoted to the practical trade-offs between agent-based and agentless security, and how to help customers navigate this choice. Rowland's strategy is to position Sandfly as a solution for environments "where agents can't be," such as in highly varied, mission-critical, or legacy systems where a traditional agent would be too risky or unstable. He emphasized that Sandfly's ability to provide "very certain" alerts and deeper forensic context after an attack is often more valuable than a flood of real-time telemetry that a less mature security team cannot process effectively. He used the example of an agent alerting on a log file being modified versus Sandfly's ability to show that a specific entry was overwritten to hide an attacker's presence.

On the topic of AI, Rowland highlighted its potential to significantly aid blue teams. Sandfly has integrated AI, specifically the Gemini LLM, to analyze forensic data and provide security teams with actionable recommendations. He praised Gemini's ability to provide high-quality, confident answers when given good data. Rowland shared a compelling anecdote about using the Gemini LLM to decode BPF bytecode in 30 seconds, a task that took a human analyst half a day to complete.

He also cautioned against the misuse of AI, noting that it can provide "very confident, wrong answers" with bad data. Rowland believes AI will not replace human security analysts but will instead accelerate their ability to ask the right questions and respond to threats faster. Looking ahead, he anticipates that attackers (red teams) will also leverage AI to make their attacks more automated and efficient.

Conclusion and Final Recommendations

To conclude the episode, Rowland offered two key recommendations for listeners to improve their Linux security game:

Recommended Reading: He stressed the importance of coding knowledge for anyone in InfoSec, particularly Linux security. His recommended reading includes books on C, Python, and shell scripting, as well as books on Linux system fundamentals and TCP/IP networking.

Level-Up Tip: His final tip was to leverage AI systems to accelerate analysis, noting that if you know the right questions to ask, these systems can provide a huge advantage.

Timeline of Key Discussion Topics

Introduction and The Agentless EDR Debate: Tim Peacock and Anton Chuvakin discuss the historical and technical debate surrounding agentless EDR, with Anton highlighting the division among former Gartner colleagues on the topic.

The Sandfly Security Approach: Craig Rowland introduces Sandfly Security and its agentless strategy, emphasizing the challenges of deploying agents across a diverse range of Linux systems and the benefits of their on-demand SSH-based forensics.

The Nuances of Linux Threats: The conversation shifts to the Linux threat landscape, debunking the myth that it's inherently more secure. Rowland explains how attackers "live off the land" by chaining benign commands and the danger of stolen SSH keys.

BPFDoor and Advanced Threats: Rowland provides a detailed example of the BPFDoor backdoor, explaining how it uses a Berkeley Packet Filter to perform stealthy command and control communications.

Agentless vs. Agent-Based Trade-offs: The hosts and guest discuss the pros and cons of agentless security, with Rowland explaining how Sandfly's post-factum analysis provides more actionable and definitive context for security teams.

The Integration of AI: Rowland shares how Sandfly uses AI, specifically the Google Gemini LLM, to enhance its forensic analysis and provide recommendations to customers, citing its ability to accelerate complex tasks like reverse engineering.

Future of AI in Security: The discussion concludes with predictions about how both blue teams and red teams will leverage AI to become more efficient, and the importance of human expertise to guide these systems.

Final Recommendations: Craig Rowland provides his recommended reading list and a final tip for leveling up Linux security skills.

View more episodes