Linux malware can avoid syscall-based endpoint protection
Briefly

A proof-of-concept program named Curing demonstrates a significant blind spot in Linux security regarding the io_uring interface. This interface, introduced in Linux kernel 5.1, allows applications to perform IO requests without traditional syscall monitoring. ARMO's security tool went undetected by popular antivirus tools because it leveraged io_uring's method of queuing operations in ring buffers, effectively exploiting a gap in security protocols. This oversight raises concerns, as many servers might be vulnerable due to the default activation of io_uring, a detail that highlights an urgent need for enhanced security measures against such bypassing techniques.
The proof-of-concept program 'Curing' utilizes the io_uring interface in Linux to perform IO operations that traditional antivirus tools fail to monitor, exploiting a major security blind spot.
ARMO's CEO Shauli Rozen emphasized that the io_uring feature is enabled by default, creating potential risks for many unprepared Linux servers that are vulnerable to overlooked malicious activities.
Read at Theregister
[
|
]