Back to blog
Cyberattack
Publication date:04.24.2025
Author:M Hinrichs

New Linux Rootkit Exploits io_uring to Evade Detection Tools

A new Linux rootkit named Curing exploits the io_uring mechanism to bypass traditional system call-based threat detection tools, revealing significant vulnerabilities in current security measures.

Abstract image of a rootkit named Curing.

Cybersecurity researchers have unveiled a proof-of-concept (PoC) rootkit named Curing, which utilizes the Linux asynchronous I/O mechanism known as io_uring to evade traditional system call-based threat detection tools. This development highlights a significant vulnerability in Linux runtime security measures, as many existing tools are unable to detect malicious activities that leverage this new method.

Key Takeaways

  • The Curing rootkit uses io_uring to bypass system call monitoring.
  • Traditional security tools like Falco and Tetragon are ineffective against io_uring-based operations.
  • Google has restricted the use of io_uring due to its potential for exploitation.
  • The rootkit facilitates communication with a command-and-control server without triggering system calls.

Understanding io_uring

io_uring is a Linux kernel interface introduced in version 5.1 in March 2019. It employs two circular buffers, known as the submission queue (SQ) and the completion queue (CQ), to manage I/O requests asynchronously between the kernel and user space applications. This mechanism allows applications to perform various actions without relying on traditional system calls, creating a significant blind spot for security tools that monitor these calls.

The Curing Rootkit

The Curing rootkit, developed by ARMO, demonstrates how malicious actors can exploit io_uring to communicate with a command-and-control (C2) server. By executing commands without making system calls, the rootkit effectively evades detection by many existing security solutions. This capability poses a serious threat to Linux systems, as it allows attackers to operate undetected.

Limitations of Current Security Tools

ARMO's analysis of popular Linux runtime security tools has revealed that:

  • Falco and Tetragon: Both tools are blind to io_uring operations due to their reliance on system call hooking.
  • CrowdStrike's Falcon Agent: Initially failed to detect file system operations using io_uring but has since implemented a fix.
  • Microsoft Defender for Endpoint: Lacks the capability to detect various threats, regardless of whether io_uring is involved.

These limitations underscore the need for enhanced detection methods that can identify threats operating outside the traditional system call framework.

Industry Response

The security risks associated with io_uring have been acknowledged by major tech companies. In June 2023, Google announced it would limit the use of io_uring across its platforms, including Android and ChromeOS, citing its potential for exploitation. Amit Schendel, Head of Security Research at ARMO, emphasized the challenge of balancing visibility into system calls with the need for sufficient context to detect threats effectively. He noted that while many vendors opt for straightforward system call hooking, this approach has inherent limitations, particularly as not all operations invoke system calls.

Conclusion

The emergence of the Curing rootkit represents a significant advancement in the tactics employed by cybercriminals, leveraging the capabilities of io_uring to bypass traditional security measures. As the cybersecurity landscape evolves, it is crucial for security vendors to adapt and develop more robust detection mechanisms that can address these new threats effectively. The ongoing dialogue within the industry regarding the implications of io_uring will be vital in shaping future security strategies.

Buy D223 Tokens with Bitmart

 

 - - -

This article was written with the assistance of AI to gather information from multiple reputable sources. The content has been reviewed and edited by our editorial team to ensure accuracy and coherence. The views expressed are those of the author and do not necessarily reflect the views of Dex223. This article is for informational purposes only and does not constitute financial advice. Investing involves risk, and you should consult a qualified financial advisor before making any investment decisions.