By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
Tech News

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

By Viral Trending Content 3 Min Read
Share
SHARE

Apr 24, 2025Ravie LakshmananEndpoint Security / Linux

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism called io_uring to bypass traditional system call monitoring.

This causes a “major blind spot in Linux runtime security tools,” ARMO said.

“This mechanism allows a user application to perform various actions without using system calls,” the company said in a report shared with The Hacker News. “As a result, security tools relying on system call monitoring are blind’ to rootkits working solely on io_uring.”

Cybersecurity

io_uring, first introduced in Linux kernel version 5.1 in March 2019, is a Linux kernel system call interface that employs two circular buffers called a submission queue (SQ) and a completion queue (CQ) between the kernel and an application (i.e., user space) to track the submission and completion of I/O requests in an asynchronous manner.

The rootkit devised by ARMO facilitates communication between a command-and-control (C2) server and an infected host to fetch commands and execute them without making any system calls relevant to its operations, instead making use of io_uring to achieve the same goals.

ARMO’s analysis of currently available Linux runtime security tools has revealed that both Falco and Tetragon are blind to io_uring-based operations owing to the fact that they are heavily reliant on system call hooking.

Cybersecurity

The security risks posed by io_uring have been known for some time. In June 2023, Google revealed that it decided to limit the use of the Linux kernel interface across Android, ChromeOS, and its production servers as it “provides strong exploitation primitives.”

“On the one hand, you need visibility into system calls; on the other, you need access to kernel structures and sufficient context to detect threats effectively,” Amit Schendel, Head of Security Research at ARMO, said.

“Many vendors take the most straightforward path: hooking directly into system calls. While this approach offers quick visibility, it comes with limitations. Most notably, system calls aren’t always guaranteed to be invoked. io_uring, which can bypass them entirely, is a positive and great example.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

iMP Tech Mini Arcade Pro Review: A Nintendo Switch Arcade Cabinet

Defence and Security vulnerabilities critical issue for business – Ibec

Cisco Premier Provider Worldwide Status for Viatel Technology Group

Why Pet-Focused Air Purification Is Becoming a Smart-Home Essential

MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

TAGGED: Android, CrowdStrike, Cyber Security, Google, Internet, kernel exploit, Linux, Microsoft Defender, rootkit
Share This Article
Facebook Twitter Copy Link
Previous Article British retail sales unexpectedly rose 0.4% in March
Next Article FBC: Firebreak Follows In Helldivers 2's Footsteps As It Reveals Release Date, Pricing, And Battle Pass
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Bitcoin price consolidates near $87K as downside risk persist
Crypto
Price distortions in EU energy market must end, Portuguese minister tells Euronews
World News
US offers Ukraine a 15-year security guarantee as part of peace plan, Zelenskyy says
World News
The Best Video Game Moments Of 2025
Gaming News
Brigitte Bardot Controversy: The Truth About the Late French Actress’ Beliefs
Celebrity
Meet the ex-penny share up 109% that has topped Rolls-Royce and Nvidia in 2025
Business
Nepal to scrap 'failed' Mount Everest waste deposit scheme
World News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Bitcoin price consolidates near $87K as downside risk persist

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Bitcoin price consolidates near $87K as downside risk persist
December 29, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?