RingReaper - New Linux EDR Evasion Tool Using io_uring Kernel Feature

This advanced red team tool demonstrates how attackers can exploit high-performance asynchronous I/O operations to conduct stealthy operations while remaining undetected by traditional security monitoring mechanisms. A sophisticated new Linux evasion tool called RingReaper has emerged, leveraging the legitimate io_uring kernel feature to bypass modern Endpoint Detection and Response (EDR) systems. The tool’s ability to perform file exfiltration, access sensitive files, and execute commands while remaining undetected highlights critical gaps in current security monitoring approaches. This function demonstrates how network communications occur through io_uring operations rather than traditional send/recv syscalls, making detection significantly more challenging. Unlike traditional approaches that rely on direct system calls, this tool operates through submission and completion rings, effectively bypassing the syscall-based detection mechanisms that most EDR solutions monitor. RingReaper exploits the Linux io_uring kernel feature to bypass EDR systems through asynchronous I/O instead of traditional syscalls. By utilizing io_uring’s asynchronous batch processing model, RingReaper generates significantly fewer auditable events, making it “Fully Undetectable” (FUD) to current EDR solutions. We recently discussed a security vulnerability in Linux’s io_uring that allows attackers to covertly deploy rootkits. This same vulnerability has been leveraged by a new tool to evade Endpoint Detection and Response (EDR) systems effectively. Current EDR solutions fail because they monitor standard syscalls rather than io_uring operations. RingReaper incorporates sophisticated post-exploitation capabilities, including file operations, process enumeration, and user discovery.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 07 Jul 2025 12:30:15 +0000


Cyber News related to RingReaper - New Linux EDR Evasion Tool Using io_uring Kernel Feature

RingReaper - New Linux EDR Evasion Tool Using io_uring Kernel Feature - This advanced red team tool demonstrates how attackers can exploit high-performance asynchronous I/O operations to conduct stealthy operations while remaining undetected by traditional security monitoring mechanisms. A sophisticated new Linux evasion ...
6 months ago Cybersecuritynews.com
CVE-2025-21630 - In the Linux kernel, the following vulnerability has been resolved: io_uring/net: always initialize kmsg->msg.msg_inq upfront syzbot reports that ->msg_inq may get used uinitialized from the following path: BUG: KMSAN: uninit-value in ...
11 months ago Tenable.com Silence
CVE-2022-48937 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2023-52903 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2025-38453 - In the Linux kernel, the following vulnerability has been resolved: ...
5 months ago
Silly EDR Bypasses and Where To Find Them - One of the drawbacks of direct & indirect syscalls is that it's clear from the callstack that you bypassed the EDR's user mode hook. As you can see from the last image, when a call is done through a hooked function the return address for the EDR's ...
2 years ago Malwaretech.com
CVE-2024-39508 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-53187 - In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: ...
1 year ago Tenable.com
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Linux io_uring Security Blind Spot Let Attackers Stealthly Deploy Rootkits - The research team at ARMO has demonstrated that popular security solutions, including CrowdStrike’s Falcon, Microsoft Defender, Falco, and Tetragon, are effectively “blind” to malicious activities performed via io_uring—an ...
8 months ago Cybersecuritynews.com
Linux 'io_uring' security blindspot allows stealthy rootkit attacks - The flaw was discovered by ARMO security researchers who developed a proof-of-concept rootkit called "Curing" to demonstrate the practicality and feasibility of attacks leveraging io_uring for evasion. The researchers explain that io_uring supports a ...
8 months ago Bleepingcomputer.com
An Introduction to Bypassing User Mode EDR Hooks - While cross-referencing notes against old blog posts, I realized that I never actually published the majority of my work on system calls and user mode hooking. System calls are the standard way to transition from user mode to kernel mode. On Windows, ...
2 years ago Malwaretech.com
EDR Redir Tool Breaks EDR - The article discusses a newly discovered tool called EDR Redir that effectively bypasses Endpoint Detection and Response (EDR) systems. EDR solutions are critical in modern cybersecurity for detecting and mitigating threats on endpoints, but ...
2 months ago Cybersecuritynews.com
Windows Incident Response: EDRSilencer - Going unnoticed on an endpoint when we believe or feel that EDR is prevalent can be a challenge, and this could be the reason why these discussions have taken hold. If you look at other aspects of EDR and SOC operations, there are plenty of ...
1 year ago Windowsir.blogspot.com Silence
EDR Freeze Tool: How Attackers Bypass Endpoint Detection and Response Systems - The article discusses the emergence of the EDR Freeze Tool, a sophisticated method used by cyber attackers to bypass Endpoint Detection and Response (EDR) systems. EDR solutions are critical in modern cybersecurity for detecting and mitigating ...
3 months ago Cybersecuritynews.com
CVE-2025-38196 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2024-42254 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-56762 - In the Linux kernel, the following vulnerability has been resolved: io_uring/sqpoll: fix sqpoll error handling races BUG: KASAN: slab-use-after-free in __lock_acquire+0x370b/0x4a10 kernel/locking/lockdep.c:5089 Call Trace: ... ...
1 year ago Tenable.com
CVE-2023-54288 - In the Linux kernel, the following vulnerability has been resolved: ...
2 weeks ago
CVE-2024-26957 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2021-47124 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2021-47292 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections - This method, dubbed BYOEDR (Bring Your Own EDR), represents a concerning evolution in defense evasion tactics that leverage legitimate security tools as weapons against themselves. Security experts recommend implementing application control measures, ...
5 months ago Cybersecuritynews.com