cognitive cybersecurity intelligence

News and Analysis

Search

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

A proof-of-concept rootkit called Curing can bypass traditional system call monitoring using a Linux asynchronous I/O mechanism, called io_uring. Security research firm ARMO found such use of io_uring leaves a gap in Linux security tools, with actions not showing as system calls. Current tools, including Falco and Tetragon, are found to be blind to io_uring-based operations due to their reliance on system call hooking.

Source: thehackernews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts