Difference between revisions of "Venom Rootkit"
Jump to navigation
Jump to search
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables the attacker to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware. | |||
systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in | |||
the malware. | |||
More information is provided in a [https://wiki.egi.eu/w/images/c/ce/Report-venom.pdf detailed report]. | |||
Latest revision as of 17:46, 11 January 2017
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables the attacker to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.
More information is provided in a detailed report.