By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Linux Security Tools Bypassed by io_uring Rootkit Technique, ARMO Research Reveals
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Linux Security Tools Bypassed by io_uring Rootkit Technique, ARMO Research Reveals
News

Linux Security Tools Bypassed by io_uring Rootkit Technique, ARMO Research Reveals

News Room
Last updated: 2025/09/16 at 6:25 AM
News Room Published 16 September 2025
Share
SHARE

Security researchers at ARMO have uncovered a significant vulnerability in Linux runtime security tools that stems from the io_uring interface, an asynchronous I/O mechanism that can completely bypass traditional system call monitoring. The research demonstrates how attackers can exploit this blind spot to operate undetected by most existing security solutions.

The team developed a proof-of-concept rootkit called “Curing” that operates entirely through io_uring operations, successfully evading detection by major security tool, including Falco, Microsoft Defender for Endpoint on Linux, and requiring specialized configuration for tools like Tetragon. The rootkit demonstrates full command-and-control functionality without making any traditional system calls that security tools typically monitor.

we presented our research on how to effectively bypass Linux runtime detection tools. This research is relevant to any Linux environment, especially in the modern cloud-native environments

The io_uring interface, introduced in Linux kernel 5.1, was designed to provide high-performance asynchronous I/O through shared ring buffers between user space and kernel space. Unlike traditional Unix I/O operations that rely on system calls, io_uring uses these ring buffers as the primary communication mechanism, effectively creating an alternative pathway that bypasses conventional monitoring approaches.

The research builds upon earlier work by Daniel Teixeira, who first demonstrated the evasion potential of io_uring in 2022, but ARMO’s team has now created the first fully functional rootkit to prove the practical threat. The io_uring interface currently supports 61 different operations, including critical network and file system functions that would typically trigger security alerts.

Testing revealed widespread vulnerabilities across both open-source and commercial security solutions. Falco, a CNCF graduated project widely used for runtime security monitoring, proved completely ineffective against io_uring-based operations due to its reliance on system call hooking. The Falco maintainers have acknowledged the issue and are working on LSM-based plugins to address the gap. Microsoft Defender for Endpoint on Linux showed similar blind spots, failing to detect various malicious activities, including sensitive file access, malware deployment, and cryptocurrency mining operations when executed through io_uring. The researchers noted that only the File Integrity Monitoring module, which likely uses Fanotify hooks, provided any detection capability.

The research exposes fundamental limitations in current eBPF-based security approaches that many vendors have adopted. While eBPF offers performance and safety advantages for building security agents, its verifier constraints often push vendors toward the simplest implementation approach of hooking directly into system calls.

This straightforward method provides quick visibility but assumes system calls will always be invoked for security-relevant operations. The io_uring bypass demonstrates that this assumption is increasingly unreliable as kernel interfaces evolve. The researchers emphasize that security vendors need to move beyond simple syscall monitoring to remain effective against modern evasion techniques.

ARMO’s research identifies several approaches for detecting io_uring-based attacks. The most promising long-term solution involves implementing KRSI (Kernel Runtime Security Instrumentation), which builds on the Linux Security Module framework to provide more reliable coverage through LSM hooks rather than syscall monitoring.

Alternative detection strategies include monitoring for anomalous io_uring usage patterns, since most legitimate applications don’t typically use this interface. However, this approach requires careful implementation to avoid false positives in dynamic environments. Security teams can also identify alternative hook points across the kernel stack, though this requires deeper kernel internals expertise. The researchers also suggest following the Windows security model, where Microsoft moved away from unreliable SSDT hooking toward structured notification routines that guarantee callback execution. Linux’s KRSI represents a similar evolution, providing more consistent security event coverage that’s harder to bypass through creative syscall avoidance.

This vulnerability has particular significance for cloud-native environments where Linux forms the foundation of containerized infrastructure. The widespread deployment of container orchestration platforms and microservices architectures means that a single security blind spot can have cascading effects across entire deployments. The research underscores the need for security solutions to be forward-compatible with evolving kernel features rather than relying on legacy monitoring approaches. As kernel interfaces continue to expand with new asynchronous mechanisms and performance optimizations, security tools that fail to adapt will leave increasingly large gaps in protection.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article This Windows 11 setting is killing your SSD lifespan
Next Article Jaguar Land Rover extends production shutdown after cyber-attack
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

All the areas and networks set to lose major mobile service TOMORROW
News
Sued ex-intern from ByteDance reportedly wins an award at the “Olympics of AI” · TechNode
Computing
The Americas are falling behind in new agricultural technologies. Here’s how to catch up.
News
Payble is building tools for Africa’s smallest businesses to grow
Computing

You Might also Like

News

All the areas and networks set to lose major mobile service TOMORROW

4 Min Read
News

The Americas are falling behind in new agricultural technologies. Here’s how to catch up.

10 Min Read
News

Java 25, the Next LTS Release, Delivers Finalized Features and Focus on Performance and Runtime

8 Min Read
News

Xbox Game Pass Is Looking Like a Great Deal for Fall With These Games

12 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?