Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Linux EDR Evasion Tool Using io_uring Kernel Feature

Posted on July 7, 2025July 7, 2025 By CWS

A complicated new Linux evasion software known as RingReaper has emerged, leveraging the reputable io_uring kernel function to bypass fashionable Endpoint Detection and Response (EDR) programs. 

This superior pink workforce software demonstrates how attackers can exploit high-performance asynchronous I/O operations to conduct stealthy operations whereas remaining undetected by conventional safety monitoring mechanisms.

We lately mentioned a safety vulnerability in Linux’s io_uring that permits attackers to covertly deploy rootkits. This identical vulnerability has been leveraged by a brand new software to evade Endpoint Detection and Response (EDR) programs successfully.

Key Takeaways1. RingReaper exploits the Linux io_uring kernel function to bypass EDR programs by means of asynchronous I/O as a substitute of conventional syscalls.2. Performs community communications and file operations with minimal auditable occasions, reaching full undetection.3. Present EDR options fail as a result of they monitor commonplace syscalls fairly than io_uring operations.4. Safety groups should implement io_uring-specific monitoring earlier than this method turns into widespread.

Evasion Approach through io_uring

RingReaper represents a major evolution in Linux-based evasion strategies by using io_uring, a kernel function launched in Linux 5.1 designed for high-performance asynchronous I/O operations. 

Not like conventional approaches that depend on direct system calls, this software operates by means of submission and completion rings, successfully bypassing the syscall-based detection mechanisms that almost all EDR options monitor.

In keeping with MatheuZ Report, the software’s structure facilities round key capabilities that show its evasive capabilities. The send_all perform exemplifies this strategy:

This perform demonstrates how community communications happen by means of io_uring operations fairly than conventional ship/recv syscalls, making detection considerably tougher.

RingReaper incorporates subtle post-exploitation capabilities, together with file operations, course of enumeration, and person discovery. The software’s cmd_privesc perform showcases its capacity to establish SUID binaries for privilege escalation:

The software’s effectiveness stems from EDR programs’ reliance on monitoring conventional syscalls like open, join, learn, and write. 

By using io_uring’s asynchronous batch processing mannequin, RingReaper generates considerably fewer auditable occasions, making it “Totally Undetectable” (FUD) to present EDR options.

Safety researchers warn that this method represents a paradigm shift in Linux malware improvement. 

The software’s capacity to carry out file exfiltration, entry delicate information, and execute instructions whereas remaining undetected highlights essential gaps in present safety monitoring approaches.

Defenders should adapt by implementing io_uring-specific monitoring capabilities, probably by means of eBPF instrumentation of io_uring_enter syscalls and inner kernel operations. 

As this method positive aspects reputation amongst superior menace actors, safety groups ought to prioritize creating detection mechanisms for io_uring-based evasion strategies earlier than they grow to be mainstream within the Linux malware panorama.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:EDR, Evasion, Feature, io_uring, Kernel, Linux, Tool

Post navigation

Previous Post: 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers
Next Post: Ingram Micro Scrambling to Restore Systems After Ransomware Attack

Related Posts

LexisNexis Risk Solutions Data Breach Exposes 364,000 individuals personal Data Cyber Security News
Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News
FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection Cyber Security News
20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
Seraphic Security Unveils BrowserTotal™ – Free AI-Powered Browser Security Assessment For Enterprises Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
  • SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
  • Ingram Micro Scrambling to Restore Systems After Ransomware Attack
  • New Linux EDR Evasion Tool Using io_uring Kernel Feature

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
  • SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
  • Ingram Micro Scrambling to Restore Systems After Ransomware Attack
  • New Linux EDR Evasion Tool Using io_uring Kernel Feature

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News