Tag Archives: Rootkit

Rootkit War Zeroaccess Kills TDL3

Cyber Gang have created a new way for getting income, the group is selling TDL3 malware on different underground forum with a modification of source code package that allow infected computer remove the TDL malware. Malware author have created two

Pirated Copies of Windows XP Top Rootkit Target

A study that has been conducted by the AVAST Virus Lab has identified un-patched and pirated versions of Windows XP as the perfect target for rootkit infection. The study found that rootkits infecting via the MBR were responsible for over

CloseTheDoor- Detect Network Security Holes

Remote backdoors is ways that are used by hackers to maintain access on the compromised systems.  Types of remote backdoors generally fall into three categories: Network Socket Listener, Trojan, or covert channels. Here there is an opensource tool that is

Utilities for Automating Rootkit Analysis

A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. Rootkits are using hooking technique to intercept function calls or messages or

Microsoft Fixes Stuxnet Rootkit Vulnerability

Today Microsoft released new patches for different windows operating system among the vulnerabilities fixed one that may be exploited by Stuxnet. Stuxnet is a combination of rootkit, worm and Trojan that is spreading through removable drives using the Microsoft Windows

Modern ways for Implementing Hook

New 64-Bit Windows Rootkit Already ‘In The Wild’ this is an article that has been issued of late and this case remind me with what Microsoft announced regarding windows Vista. security specialist stated at a previous time that there will

Vulnerability in Apple Mac Keyboards

All keyboards include a processors and memory chip. Apple keyboard is not an exception. They contain an 8 KB flash memory and 256 bytes of RAM. K.Chen researcher at Georgia institute of Technology presented at the Black Hat conference how