Difference between revisions of "Venom Rootkit"
Jump to navigation
Jump to search
Line 5: | Line 5: | ||
The full report can be found in: | The full report can be found in: | ||
[[File:Report 20160111-2.pdf]] |
Revision as of 16:04, 11 January 2017
Venom Rootkit
The malware studied acted as a Linux rootkit aimed at maintaining unauthorized access on compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.
The full report can be found in: File:Report 20160111-2.pdf