While monitoring the activity of the LightBasin cybercriminal group, experts came across a previously unknown Unix rootkit that is used to steal payment data from ATMs. Using this malware, attackers can conduct unauthorized transactions.
The operators of the new rootkit are known for their...
The SafeBreach study reveals serious risks in converting file paths.
A new study has found vulnerabilities in the process of converting DOS to NT paths in the Windows operating system, which can allow attackers to hide files, mimic directories and processes, acquiring capabilities similar to...
Even the security mechanisms don't help you get rid of the new hacking method.
North Korean hackers Lazarus used a vulnerability in the Windows AppLocker driver to gain access at the kernel level and disable security tools, avoiding detection.
Avast identified and reported on the activities of...
EXCLUSIVELY FOR EDUCATIONAL PURPOSES!
Good day, friends, I want to show you a not bad selection of Linux rootkit sources, made for different architectures, with a different set of functions (from hidden SSH to a full-fledged keylogger with a built-in IRC bot.)
For those who do not fumble at...
What are Linux rootkits?
Rootkits help an attacker secure access to a compromised system, with an emphasis on maximizing the invisibility of the malware. To do this, they hide network connections, processes, folders, files, fake their contents. Usually, a rootkit carries hacker utilities for...
В этой статье мы погорим с тобой о руткитах для операционных систем NT/W2k. Согласись, эта, с позволения сказать, отрасль очень бурно развивается! Если еще год назад мы могли только наслаждаться альфа-версией одного единственного NT-руткита (и каждый ламерский админ знал, что при странном...