Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

New GPU-based Linux Rootkit and Keylogger


  • Please log in to reply
1 reply to this topic

#1 NickAu

NickAu

    Bleepin' Fish Doctor


  • Moderator
  • 12,684 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1 Australia
  • Local time:04:02 AM

Posted 09 May 2015 - 04:27 PM

 

 The world of hacking has become more organized and reliable over recent years and so the techniques of hackers.

Nowadays, attackers use highly sophisticated tactics and often go to extraordinary lengths in order to mount an attack.

And there is something new to the list:

A team of developers has created not one, but two pieces of malware that run on an infected computer’s graphics processor unit (GPU) instead of its central processor unit (CPU), in order to enhance their stealthiness and computational efficiency.
Like Us on Facebook:

The two pieces of malware:

    Jellyfish Rootkit for Linux operating system
    Demon Keylogger


The source code of both the Jellyfish Rootkit and the Demon keylogger, which are described as proof-of-concepts malware, have been published on Github.

Until now, security researchers have discovered nasty malware running on the CPU and exploiting the GPU capabilities in an attempt to mine cryptocurrencies such as Bitcoins.

However, these two malware could operate without exploiting or modifying the processes in the operating system kernel, and this is why they do not trigger any suspicion that a system is infected and remain hidden.
 

http://thehackernews.com/2015/05/gpu-rootkit-linux-Keylogger.html

 

Lucky it's just proof of concept.


Edited by NickAu, 09 May 2015 - 04:32 PM.


BC AdBot (Login to Remove)

 


#2 paul88ks

paul88ks

  • Members
  • 1,284 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Dallas,Texas
  • Local time:01:02 PM

Posted 09 May 2015 - 07:53 PM

So is the end result of this not to get online unless you absolutely have to? Or will the war just continue?






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users