Ringreaper Linux malware outsmarts EDR tools
Автор: infosecguy5150
Загружено: 2025-08-20
Просмотров: 41
Описание: This one-minute breakdown exposes RingReaper — a stealthy Linux malware that hides in plain sight by abusing io_uring_prep_* calls instead of normal syscalls. Targeted at Linux users and sysadmins, the video explains how RingReaper runs payloads like "$WORKDIR"/cmdMe and "$WORKDIR"/executePs to enumerate processes, scan /proc and /dev/pts, and map users without triggering EDR. Learn about initial access via malicious downloads or Python droppers, what to monitor (io_uring_setup and rare syscalls), and detection tips for binaries probing system internals. Critical viewing for incident responders and sysadmins who want to harden detection and response. If this helped, please like and share the video. #RingReaper #LinuxMalware #io_uring #EDR #Infosec
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: