Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "Venom Rootkit"

From EGIWiki
Jump to navigation Jump to search
Line 1: Line 1:
= Venom Rootkit =
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.
The malware studied acted as a Linux rootkit aimed at maintaining unauthorized access on compromised Linux
systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in
the malware.


The full report can be found in:
The full report can be found in:
[[File:Report 20160111-2.pdf]]
[[File:report-venom.pdf]]

Revision as of 17:38, 11 January 2017

EGI CSIRT performed a detailed analysis of Linux rootkit, which enables to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.

The full report can be found in: File:Report-venom.pdf