rootkit

PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms

Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic Security…

1 year ago

Lazarus APT exploited zero-day in Windows driver to gain kernel privileges

North Korea-linked Lazarus APT exploited a zero-day flaw in the Windows AppLocker driver (appid.sys) to gain kernel-level access to target…

2 years ago

Reptile Rootkit employed in attacks against Linux systems in South Korea

Researchers observed threat actors that are using an open-source rootkit called Reptile in attacks aimed at systems in South Korea. Reptile is…

3 years ago

New UEFI rootkit Black Lotus offered for sale at $5,000

Black Lotus is a new, powerful Windows UEFI rootkit advertised on underground criminal forums, researcher warns. Cybersecurity researcher Scott Scheferman…

3 years ago

CosmicStrand, a new sophisticated UEFI firmware rootkit linked to China

Kaspersky uncovered a new UEFI firmware rootkit, tracked as CosmicStrand, which it attributes to an unknown Chinese-speaking threat actor.  Researchers…

4 years ago

New iLOBleed Rootkit, the first time ever that malware targets iLO firmware

A previously unknown rootkit, dubbed iLOBleed, was used in attacks aimed at HP Enterprise servers that wiped data off the…

4 years ago

Microsoft investigates threat actor distributing malicious Netfilter Driver

Microsoft is investigating an strange attack, threat actor used a driver signed by the company, the Netfilter Driver, to implant…

5 years ago

New Purple Fox version includes Rootkit and implements wormable propagation

Researchers from Guardicore have spotted a new variant of the Purple Fox Windows malware that implements worm-like propagation capabilities. Researchers…

5 years ago

Project Freta, a free service that allows finding malware in OS memory snapshots

Microsoft launched Project Freta, a free service that allows users to find malware, including rootkit, in operating system memory snapshots.…

6 years ago

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Researchers discovered multiple flaws in more than 40 device drivers from at least 20 different vendors that could to install…

6 years ago

This website uses cookies.