Tag: Rootkit

  • Cryptocurrency Mining Malware Targets Linux Machines Uses Rootkit to Hide From Monitoring Tools

    A new cryptocurrency mining malware bundled with rootkit components targets Linux machines to mine cryptocurrency and hides from monitoring …

  • Russia’s Sednit Deploys First Firmware-Level Rootkit in the Wild

    Advanced persistent threat (APT) group Sednit has deployed a rootkit capable of modifying a computer’s Unified Extensible Firmware …

  • Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild

    Cybersecurity researchers at ESET have unveiled what they claim to be the first-ever UEFI rootkit being used in the wild, allowing hackers …

  • Game Mod Developer Caught Deliberately Distributing Malware

    It’s sometimes genuinely odd how little attention people pay to their own industry. In 2007, Sony dropped a rootkit onto users’ PCs …

  • 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed

    WikiLeaks has just published a new set of classified documents linked to another CIA project, dubbed ‘Imperial,’ which reveals details of at least three CIA-developed hacking tools and implants designed to target computers running Apple Mac OS X and different flavours of Linux operating systems. If you are a regular reader of THN, you must…

  • Adware the series, the final: Tools section

    April 24, 2012 – The fight against malware is a cat-and-mouse game. It is constant and constantly escalating. Read full news article on Malwarebytes Unpacked  

  • Insider who scammed $14.3m lottery ‘win’ pleads guilty

    Eddie Raymond Tipton, the former Hot Lotto security director who was convicted of running a malware-generating luck factory to scam his own lottery for $14.3m, is looking at up to 25 years in jail. On June 29, the Iowa attorney-general’s office announced that Tipton had pleaded guilty to the felony charge of ongoing criminal conduct…

  • Cat-Phishing Hackers for Fun and Profit

    On June 14th, 2017, a new variant of ZXShell appears to have been uploaded from the Marmara region of Turkey. The Trojan itself is well known and contained x32 and x64 rootkits. Read full news article on The RSA Blog  

  • Adware the series, part 6

    In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Read full news article on Malwarebytes Unpacked  

  • Adware the series, part 4

    In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Read full news article on Malwarebytes Unpacked