Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
研究人员展示了一种名为Curing的Rootkit,利用Linux的io_uring机制绕过传统系统调用监控,导致现有安全工具失效。该机制允许应用程序无需系统调用即可执行操作,使得依赖系统调用监控的安全工具无法检测到基于io_uring的攻击。部分厂商已修复相关问题,但微软Endpoint Defender仍无法检测此类威胁。 2025-4-24 12:58:0 Author: thehackernews.com(查看原文) 阅读量:9 收藏

Endpoint Security / Linux

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring.

This causes a "major blind spot in Linux runtime security tools," ARMO said.

"This mechanism allows a user application to perform various actions without using system calls," the company said in a report shared with The Hacker News. "As a result, security tools relying on system call monitoring are blind' to rootkits working solely on io_uring."

Cybersecurity

io_uring, first introduced in Linux kernel version 5.1 in March 2019, is a Linux kernel system call interface that employs two circular buffers called a submission queue (SQ) and a completion queue (CQ) between the kernel and an application (i.e., user space) to track the submission and completion of I/O requests in an asynchronous manner.

The rootkit devised by ARMO facilitates communication between a command-and-control (C2) server and an infected host to fetch commands and execute them without making any system calls relevant to its operations, instead making use of io_uring to achieve the same goals.

ARMO's analysis of currently available Linux runtime security tools has revealed that both Falco and Tetragon are blind to io_uring-based operations owing to the fact that they are heavily reliant on system call hooking.

CrowdStrike's Falcon agent, which also failed to file system operations performed using io_uring, has since rolled out a fix for the issue. However, Microsoft Defender for Endpoint on Linux is said to lack capabilities to detect various kinds of threats, irrespective of whether io_uring was used.

Cybersecurity

The security risks posed by io_uring have been known for some time. In June 2023, Google revealed that it decided to limit the use of the Linux kernel interface across Android, ChromeOS, and its production servers as it "provides strong exploitation primitives."

"On the one hand, you need visibility into system calls; on the other, you need access to kernel structures and sufficient context to detect threats effectively," Amit Schendel, Head of Security Research at ARMO, said.

"Many vendors take the most straightforward path: hooking directly into system calls. While this approach offers quick visibility, it comes with limitations. Most notably, system calls aren't always guaranteed to be invoked. io_uring, which can bypass them entirely, is a positive and great example."

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/04/linux-iouring-poc-rootkit-bypasses.html
如有侵权请联系:admin#unsafe.sh