Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "Venom Rootkit"

From EGIWiki
Jump to navigation Jump to search
 
Line 1: Line 1:
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables the attacker to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.


More information is provided in a [https://wiki.egi.eu/w/images/c/ce/Report-venom.pdf detailed report].
More information is provided in a [https://wiki.egi.eu/w/images/c/ce/Report-venom.pdf detailed report].

Latest revision as of 17:46, 11 January 2017

EGI CSIRT performed a detailed analysis of Linux rootkit, which enables the attacker to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.

More information is provided in a detailed report.