Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Linux EDR Evasion Tool Using io_uring Kernel Feature

New Linux EDR Evasion Tool Using io_uring Kernel Feature

Posted on July 7, 2025July 7, 2025 By CWS

A complicated new Linux evasion software known as RingReaper has emerged, leveraging the reputable io_uring kernel function to bypass fashionable Endpoint Detection and Response (EDR) programs. 

This superior pink workforce software demonstrates how attackers can exploit high-performance asynchronous I/O operations to conduct stealthy operations whereas remaining undetected by conventional safety monitoring mechanisms.

We lately mentioned a safety vulnerability in Linux’s io_uring that permits attackers to covertly deploy rootkits. This identical vulnerability has been leveraged by a brand new software to evade Endpoint Detection and Response (EDR) programs successfully.

Key Takeaways1. RingReaper exploits the Linux io_uring kernel function to bypass EDR programs by means of asynchronous I/O as a substitute of conventional syscalls.2. Performs community communications and file operations with minimal auditable occasions, reaching full undetection.3. Present EDR options fail as a result of they monitor commonplace syscalls fairly than io_uring operations.4. Safety groups should implement io_uring-specific monitoring earlier than this method turns into widespread.

Evasion Approach through io_uring

RingReaper represents a major evolution in Linux-based evasion strategies by using io_uring, a kernel function launched in Linux 5.1 designed for high-performance asynchronous I/O operations. 

Not like conventional approaches that depend on direct system calls, this software operates by means of submission and completion rings, successfully bypassing the syscall-based detection mechanisms that almost all EDR options monitor.

In keeping with MatheuZ Report, the software’s structure facilities round key capabilities that show its evasive capabilities. The send_all perform exemplifies this strategy:

This perform demonstrates how community communications happen by means of io_uring operations fairly than conventional ship/recv syscalls, making detection considerably tougher.

RingReaper incorporates subtle post-exploitation capabilities, together with file operations, course of enumeration, and person discovery. The software’s cmd_privesc perform showcases its capacity to establish SUID binaries for privilege escalation:

The software’s effectiveness stems from EDR programs’ reliance on monitoring conventional syscalls like open, join, learn, and write. 

By using io_uring’s asynchronous batch processing mannequin, RingReaper generates considerably fewer auditable occasions, making it “Totally Undetectable” (FUD) to present EDR options.

Safety researchers warn that this method represents a paradigm shift in Linux malware improvement. 

The software’s capacity to carry out file exfiltration, entry delicate information, and execute instructions whereas remaining undetected highlights essential gaps in present safety monitoring approaches.

Defenders should adapt by implementing io_uring-specific monitoring capabilities, probably by means of eBPF instrumentation of io_uring_enter syscalls and inner kernel operations. 

As this method positive aspects reputation amongst superior menace actors, safety groups ought to prioritize creating detection mechanisms for io_uring-based evasion strategies earlier than they grow to be mainstream within the Linux malware panorama.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:EDR, Evasion, Feature, io_uring, Kernel, Linux, Tool

Post navigation

Previous Post: 1000+ New Fake Domains Mimic Amazon Prime Day Registered to Hunt Online Shoppers
Next Post: Ingram Micro Scrambling to Restore Systems After Ransomware Attack

Related Posts

CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks CISA Warns of PHPMailer Command Injection Vulnerability Exploited in Attacks Cyber Security News
X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-grade AES-256 Encryption Cyber Security News
PornHub Breached by ShinyHunters Group and Premium Members Data Stolen PornHub Breached by ShinyHunters Group and Premium Members Data Stolen Cyber Security News
Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems Hackers Weaponizing SVG Files With Malicious Embedded JavaScript to Execute Malware on Windows Systems Cyber Security News
Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes Cyber Security News
New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News