F-Secure: Storm Worm Starts to Use Rootkit Techniques
Not good.
Kimmo writes on the F-Secure "News from the Lab" Blog:
The weekend has been very busy with Storm Worm. We have lately found out new variants that have started to use kernel-mode rootkit techniques to hide their files, registry keys and active network connections. F-Secure BlackLight is able to detect the hidden files.More here.
0 Comments:
Post a Comment
<< Home