A researcher is warning that a programming error in the Windows kernel might inhibit security software vendors and kernel developers from properly identifying modules loaded during runtime, including potentially malicious files.
Developers behind Dridex have launched a major new version of the banking trojan, one that employs a unique method for injecting malicious code based on a technique called AtomBombing. And UK banks already feel the heat.
Ten days after privately disclosing an actively exploited, critical Windows vulnerability to Microsoft Corporation, Google's Threat Analysis Group went public with the flaw, despite the lack of a patch.
Avoiding detection is generally a top priority for any malicious code developer, but the creators of the newly discovered "Furtim" truly appear to have gone the extra mile to ensure that their malware flies under the radar.