Rootkits

Deadline looms to remove click-fraud malware

By

Many major businesses and government agencies still have systems infected with the DNSChanger malware, which reroutes the victim machine to websites and online advertisements of the attackers' choosing. That may mean they could lose web connectivity.

WordPress attacks try to infect users with dangerous rootkit

By

Automated attackers are trawling the web for vulnerable WordPress blogs so they can silently redirect users to dangerous exploits. So far, however, the number of victims is in the hundreds.

Just-patched critical Microsoft bug under attack

By

Researchers warned Thursday that a recently patched vulnerability in Windows Media is being used by remote attackers to launch malware.

Researchers uncover first active BIOS rootkit attack

By

While any rootkit that targets the BIOS of a computer is a scary proposition, users should rest easy that the threat -- as it stands now -- won't impact many people.

New "indestructible" botnet comprised of 4.5 million PCs

By

A new botnet made up of more than 4.5 million infected computers is "practically indestructible," according to researchers at Kaspersky Lab. But some disagree.

Stuxnet examined at Vancouver conference

By

Researchers presenting findings on the Stuxnet worm said "This is not a teenage hacker coding in his bedroom-type operation."

Microsoft looks into malware spreading via USB

By

Microsoft is investigating new reports that malware is propagating through USB devices, which may be linked to an unpatched vulnerability in Windows.

Microsoft reinstates faulty fix, but with rootkit detection

By

Microsoft on Tuesday resumed shipping a recent patch, MS10-015, through Windows Update. The fix was sidelined after Microsoft determined that it resulted in a denial-of-service condition when installed by users whose machines are infected with a rootkit known as Alureon. The revamped bulletin now contains "detection logic" to find the Alureon rookit. If it does, the computer does not load the patch. -- DK

Professors highlight threat of mobile device rootkits

By

Two Rutgers University computer science professors are calling for more research into the detection of smartphone rootkits, which cannot be found in the same as they are on desktops.

Rootkit to blame for Windows fix resulting in blue screen

By

Microsoft has concluded that PCs displaying the "blue screen of death" when trying to install a February patch contain a rootkit.

Facebook cuts off accounts spreading rogue anti-virus

By

On the same day that the Internet Crime Complaint Center issued an alert on the ongoing dangers of social networking fraud, a computer security researcher reported on a new Facebook threat in which scores of fake member profiles were attempting to push rogue anti-virus programs.

Zbot evades most anti-virus programs

By

Researchers at Trusteer credit the trojan's morphing and rootkit capabilities with keeping it in the wild.

It's official: Microsoft to offer free anti-malware service

It's official: Microsoft to offer free anti-malware service

By

Next week, Microsoft will make available to consumers a new, free anti-malware service to replace its subscription model.

Conficker worm updated to send spam, hawk fake AV

By

One week after Conficker's supposed activation date, the worm awoke from its slumber.

Paul McCartney's website hacked to distribute malware

By

The website for former Beatle Paul McCartney is the latest legitimate website hacked to serve up malware.

Spyware rise caused by new Virtumundo infections

By

A pesky adware trojan is continuing to leave its mark on susceptible users.

Virtumundo, now a worm, spreading via USB stick

By

A long-standing trojan that serves as a malware-distribution service has found a new way to infect computers: via a USB stick or other removable device.

Srizbi detection added

By

Microsoft has added detection for the infectious Srizbi malware family to its Software Removal Tool, released Tuesday with the company's monthly patches. Srizbi is a trojan downloader or rootkit that propagates through malicious emails. If recipients fall victim, their machines become part of a botnet, whose chief goal is to deliver spam. In October, Microsoft added similar detection for the Rustock bot malware. — DK

Keylogger spyware ordered off the market

By

In a victory for privacy advocates, an Orlando, Fla.-based company has been ordered not to sell keylogger spyware.

Linux administrators warned of SSH key attacks

By

Attackers are using compromised SSH keys to launch in-the-wild attacks against Linux-based computing environments, US-CERT warned Tuesday.

Trend Micro to boycott security tests

The security vendor's chief technology officer said today the company will withdraw from the popular VB100 anti-malware tests, launching a tirade against the testers' methodology.

From Interop: Be mindful of vendors' motives

By

IT security vendors' sole purpose is to generate revenue -- not offer complete security -- and they will only create solutions to stop dangerous threats when they are incentivized to do so, the principal security strategist for IBM Internet Security Systems said Wednesday at Interop in Las Vegas.

Microsoft acquires anti-rootkit company

By

Microsoft has shored up its enterprise security portfolio -- and gained a toehold in the government marketplace -- with the acquisition of Komoku, a government-funded startup with products that snoop out rootkits.

Researchers turn Sun Solaris utility into fuzzing tool

By

Security researchers have developed a way to turn a utility for Sun Microsystems' Solaris operating system into a rootkit-like, reverse engineering tool that can be deployed to quickly locate application vulnerabilities and create exploits.

DHS project delivers new malware capture method

By

A project funded by the Department of Homeland Security promises to give security researchers a new way to kill botnets and targeted malware attacks before they infect computers.

Spam offers bogus Hillary Clinton interview video

By

Spammers capitalizing on nationwide interest in the Democratic presidential nomination battle are sending out messages offering a link to a "Hillary Clinton video interview" that instead launches a trojan downloader on the victim's PC.

Researcher releases exploit codes for Linux 2.6 flaws

By

A researcher has released exploit codes for newly discovered Linux kernel 2.6 flaws which could permit attackers to gain root-system privileges they can use to steal data or mount denials of service on Linux-based systems.

Malware up 800 percent in 2007, says Panda

By

The amount of malware captured last year increased by 800 percent over 2006, researchers said this week.

Rootkit targeting Master Boot Record in the wild

By

A rootkit attacking Master Boot Record (MBR) - a vector used more than a decade ago on MS-DOS operating systems -- in various Microsoft Windows operating systems is spreading in the wild, according to researchers.

Bhutto assassination video, websites faked to spread malware

By

Cyberattackers are exploiting the assassination of former Pakistani Prime Minister Benazir Bhutto to spread malware, according to researchers at numerous anti-virus vendors.

Sign up to our newsletters

POLL