Advertisement
Top

Tag: rootkit


Threats & Malware, Virus & Malware

Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector

July 12, 2023

Via: The Hacker News

Cybersecurity researchers have unearthed a novel rootkit signed by Microsoft that’s engineered to communicate with an actor-controlled attack infrastructure. Trend Micro has attributed the activity cluster to the same actor that was previously identified as behind the FiveSys rootkit, which […]


Cyber-crime, Malware

Hackers Target Bank Networks with new Rootkit to Steal Money from ATM Machines

March 18, 2022

Via: The Hacker News

A financially motivated threat actor has been observed deploying a previously unknown rootkit targeting Oracle Solaris systems with the goal of compromising Automatic Teller Machine (ATM) switching networks and carrying out unauthorized cash withdrawals at different banks using fraudulent cards. […]


Hacker, Threats & Malware

Chinese Hackers Used a New Rootkit to Spy on Targeted Windows 10 Users

October 1, 2021

Via: The Hacker News

A formerly unknown Chinese-speaking threat actor has been linked to a long-standing evasive operation aimed at South East Asian targets as far back as July 2020 to deploy a kernel-mode rootkit on compromised Windows systems. Attacks mounted by the hacking […]


Network security, Threats & Malware

How to identify, prevent and remove rootkits in Windows 10

February 18, 2019

Via: CSO Online

Attackers use rootkits to hide malware on a device in a way that allows it to persist undetected over time, sometimes for years. During that time, it can steal data or resources, or surveil communications. Operating system-based rootkits are scary […]


Threats & Malware

Design flaw in Intel processors opens door to rootkits, researcher says

August 7, 2015

Via: threats-and-malware

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability […]