Venom Rootkit
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
EGI CSIRT performed a detailed analysis of Linux rootkit, which enables the attacker to maintain unauthorized access to compromised Linux systems. The rootkit was titled VENOM, referring to a term often used in the internal protocol implemented in the malware.
More information is provided in a detailed report.