Linux io_uring Exploit Rootkit Circumvents System Call-Based Threat Detection Programs

Cybersecurity analysts have showcased an evidence-of-exploit (EoE) rootkit named Curing which utilizes a Linux non-blocking I/O technique named io_uring to elude conventional system call surveillance.

Cybersecurity analysts have showcased an evidence-of-exploit (EoE) rootkit named Curing which utilizes a Linux non-blocking I/O technique named io_uring to elude conventional system call surveillance.
As per ARMO, this results in a “significant absence in Linux real-time security utilities.”
“The capability enables a user application to carry out diverse operations without relying on system calls,” stated the firm within

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.