Hackers bypass Linux Security with Curing

Hackers can now bypass Linux security thanks to terrifying new “Curing” rootkit.

Most Linux users assume their security tools will catch bad actors before damage is done — but sadly, new research suggests that confidence may be misplaced. You see, ARMO, the company behind Kubescape, has uncovered what could be one of the biggest blind spots in Linux security today. The company has released a working rootkit called “Curing” that uses io_uring, a feature built into the Linux kernel, to stealthily perform malicious activities without being caught by many of the detection solutions currently on the market.

At the heart of the issue is the heavy reliance on monitoring system calls, which has become the go-to method for many cybersecurity vendors. The problem? Attackers can completely sidestep these monitored calls by leaning on io_uring instead. This clever method could let bad actors quietly make network connections or tamper with files without triggering the usual alarms.

The findings from ARMO are especially troubling for fans of eBPF-based security tools. While eBPF is often celebrated for its power and flexibility, it turns out that looking only at system calls leaves a dangerous blind spot when io_uring is in play. With Linux dominating the cloud-native space, this vulnerability could have serious consequences for countless businesses relying on these detection systems.

Read More Here.


Discover more from Vancouver Linux Users Group

Subscribe to get the latest posts sent to your email.


Posted

in

by

Discover more from Vancouver Linux Users Group

Subscribe now to keep reading and get access to the full archive.

Continue reading