Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Linux Io_uring Poc Routkit bypasses systemic tools for threats based on call, threatening tools
Global Security

Linux Io_uring Poc Routkit bypasses systemic tools for threats based on call, threatening tools

AdminBy AdminApril 24, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 24, 2025Red LakshmananSecurity of the final point / Linux

Cybersecurity researchers demonstrated proof of concept (POC) Rortkit, called Cure Using asynchronous I/Output Linux io_uring bypass traditional monitoring of system calls.

This causes “the main blind place in the Linux safety tools,” Arma said.

“This mechanism allows the user to perform different actions without using system calls,” the company – Note In a report that shared with Hacker News. “As a result, safety tools that rely on system call monitoring, blind” for Rotkits that work solely on io_ring “.

Cybersecurity

io_uring, by -first introduce In Linux Kernel version 5.1 in March 2019 is the system of Linux kernel interface that hire Two round buffers called the turn of submission (SQ) and the completion queue between the nucleus and the application (ie the user space) for tracking the submission and completion of the input/Osynchronous input requests.

Rootkit, developed by ARMO, facilitates the link between the team server and control (C2), and the infected host to obtain teams and execute them without making any system calls relevant to its activities, instead of using io_ring to achieve the same goals.

https://www.youtube.com/watch?v=oj6vqo87mi

ARMO analysis on the currently available Linux Runnewation tools have shown that both Phallus and Four Due to the fact that they are heavily dependent on the fact that they are heavily dependent on the system call connection.

The Falcon Crowdstrike agent, which also failed to submit operations on the system performed by io_urune, has since rolled out the correction for this issue. However, it is said that Microsoft Defender for the final point on Linux lacks opportunities to detect different types of threats, regardless of whether io_ring was used.

Cybersecurity

The risks provided by io_urune have been known for a while. In June 2023 Google disclosed What he decided to restrict the use of Linux kernel interface in Android, Chromeos and its production servers as “provides strong exploitation”.

“On the one hand, you need visibility in system calls; on the other, you need access to the kernel structures and sufficient context for effective threats,” said AMIT SEENDEL, Head of the ARMO security.

“Many suppliers go the simplest way: connecting directly to system calls. Although this approach offers rapid visibility, it comes with restrictions. First of all, system calls will not always be caused. Io_uring, which can completely bypass them, is a positive and great example.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.