Difference between revisions of "Venom Rootkit"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware. | |||
systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in | |||
the malware. | |||
The full report can be found in: | The full report can be found in: | ||
[[File: | [[File:report-venom.pdf]] |
Revision as of 17:38, 11 January 2017
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.
The full report can be found in: File:Report-venom.pdf