Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Linux Io_uring Poc Routkit bypasses systemic tools for threats based on call, threatening tools
Global Security

Linux Io_uring Poc Routkit bypasses systemic tools for threats based on call, threatening tools

AdminBy AdminApril 24, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 24, 2025Red LakshmananSecurity of the final point / Linux

Cybersecurity researchers demonstrated proof of concept (POC) Rortkit, called Cure Using asynchronous I/Output Linux io_uring bypass traditional monitoring of system calls.

This causes “the main blind place in the Linux safety tools,” Arma said.

“This mechanism allows the user to perform different actions without using system calls,” the company – Note In a report that shared with Hacker News. “As a result, safety tools that rely on system call monitoring, blind” for Rotkits that work solely on io_ring “.

Cybersecurity

io_uring, by -first introduce In Linux Kernel version 5.1 in March 2019 is the system of Linux kernel interface that hire Two round buffers called the turn of submission (SQ) and the completion queue between the nucleus and the application (ie the user space) for tracking the submission and completion of the input/Osynchronous input requests.

Rootkit, developed by ARMO, facilitates the link between the team server and control (C2), and the infected host to obtain teams and execute them without making any system calls relevant to its activities, instead of using io_ring to achieve the same goals.

https://www.youtube.com/watch?v=oj6vqo87mi

ARMO analysis on the currently available Linux Runnewation tools have shown that both Phallus and Four Due to the fact that they are heavily dependent on the fact that they are heavily dependent on the system call connection.

The Falcon Crowdstrike agent, which also failed to submit operations on the system performed by io_urune, has since rolled out the correction for this issue. However, it is said that Microsoft Defender for the final point on Linux lacks opportunities to detect different types of threats, regardless of whether io_ring was used.

Cybersecurity

The risks provided by io_urune have been known for a while. In June 2023 Google disclosed What he decided to restrict the use of Linux kernel interface in Android, Chromeos and its production servers as “provides strong exploitation”.

“On the one hand, you need visibility in system calls; on the other, you need access to the kernel structures and sufficient context for effective threats,” said AMIT SEENDEL, Head of the ARMO security.

“Many suppliers go the simplest way: connecting directly to system calls. Although this approach offers rapid visibility, it comes with restrictions. First of all, system calls will not always be caused. Io_uring, which can completely bypass them, is a positive and great example.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.