
An Israeli cybersecurity firm has demonstrated a significant weakness in Linux security tools through a proof-of-concept (PoC) rootkit that can evade detection by several major products in the market. The firm, Armo, specializes in cloud and Kubernetes security, and their PoC, named ‘Curing’, leverages the io_uring interface in the Linux kernel to bypass security mechanisms.
Armo discovered that the PoC could bypass three prominent Linux security tools: Falco, Tetragon, and Microsoft Defender. Falco, which is a project originally developed by Sysdig and now a Cloud Native Computing Foundation graduate, failed to detect the Curing rootkit altogether. Microsoft Defender also struggled and could not identify Curing or other common malware variants. Tetragon managed some detection of the io_uring interface but only when employing additional techniques not used by default.
The firm pointed to an over-reliance on Extended Berkeley Packet Filter (eBPF) based agents by these tools, indicating that such a monitoring approach solely focused on system calls can miss threats like Curing that circumvent these calls through the io_uring method. This design flaw suggests a need for enhanced monitoring solutions that can adapt to new kernel features and techniques as they emerge.
The io_uring API, introduced in Linux 5.1 to improve asynchronous I/O operations, offers efficient performance but also presents vulnerabilities that can be exploited, demonstrated by the Curing rootkit. Armo aimed to highlight the inadequacy of existing Linux security solutions in addressing these emerging threats, urging vendors to reconsider their architectural designs for better future compatibility.
Responses from affected vendors have varied. Falco’s maintainers confirmed the detection shortcomings and suggested they were working on an improved plugin. However, Armo’s attempts to engage with Microsoft regarding its Defender software received no response. Isovalent, the vendor behind Tetragon, defended its tool by emphasizing its flexibility and capabilities beyond simple syscall monitoring.
While Armo’s findings spotlight critical issues in existing Linux security mechanisms, it’s worth noting that their promotion also serves to market their own security platform, which purportedly does not face the same detection challenges. They recommended that security vendors implement monitoring for unusual use cases of the io_uring interface, as sudden changes in application behavior may signal potential threats.
Welcome to DediRock, your trusted partner in high-performance hosting solutions. At DediRock, we specialize in providing dedicated servers, VPS hosting, and cloud services tailored to meet the unique needs of businesses and individuals alike. Our mission is to deliver reliable, scalable, and secure hosting solutions that empower our clients to achieve their digital goals. With a commitment to exceptional customer support, cutting-edge technology, and robust infrastructure, DediRock stands out as a leader in the hosting industry. Join us and experience the difference that dedicated service and unwavering reliability can make for your online presence. Launch our website.