

Cyberattack Targets Exposed MS-SQL Servers
April 25, 2025
SessionShark: New Toolkit Targeting Microsoft Office 365 Users and Bypassing MFA Security
April 25, 2025
Cyberattack Targets Exposed MS-SQL Servers
April 25, 2025
SessionShark: New Toolkit Targeting Microsoft Office 365 Users and Bypassing MFA Security
April 25, 2025Severity
High
Analysis Summary
A significant security gap has been identified in Linux's io_uring interface, which is widely used for efficient asynchronous I/O operations. This vulnerability enables attackers to deploy rootkits that operate undetected by many security tools. The issue arises because io_uring allows applications to perform I/O operations without invoking traditional system calls, bypassing standard monitoring mechanisms. This vulnerability affects nearly all commercial Linux runtime security tools that rely on system call monitoring for threat detection.
Researchers have demonstrated the severity of this flaw by developing "Curing," a proof-of-concept rootkit that exclusively utilizes io_uring for its operations. This rootkit can establish command-and-control channels, access sensitive files, and execute malicious commands, all while remaining invisible to popular security solutions.
The implications are particularly concerning for cloud environments and data centers, where Linux systems are prevalent. The stealthiness of io_uring-based attacks makes them challenging to detect and mitigate using conventional security approaches. While some vendors have acknowledged the issue and released updates to enhance detection capabilities.
Researchers found alarming results when testing major security products against their rootkits. Microsoft Defender for Endpoint on Linux missed multiple attack indicators, including malware drops and suspicious network connections. As Linux is the foundation for most cloud infrastructure, this vulnerability impacts organizations across all sectors.
Impact
- Security Bypass
- Sensitive Data Theft
Remediation
- Update to the latest stable Linux kernel version to patch known vulnerabilities in io_uring.
- Implement Kernel Runtime Security Instrumentation (KRSI) to enhance detection of kernel-level anomalies.
- Disable io_uring for unprivileged users by setting kernel.io_uring_disabled to 1 or 2 in sysctl configurations.
- Monitor system logs for unusual io_uring activity, such as unexpected buffer allocations or system calls.
- Employ runtime security tools that have been updated to detect io_uring-based threats, such as Falcon and Tetragon.
- Regularly audit system configurations and permissions to prevent unauthorized access to io_uring interfaces.
- Educate system administrators about the potential risks associated with io_uring and best practices for mitigation.