Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


New GPU-based Linux Rootkit and Keylogger

  • Please log in to reply
1 reply to this topic

#1 NickAu


    Bleepin' Fish Doctor

  • Moderator
  • 13,562 posts
  • Gender:Male
  • Location: Australia
  • Local time:02:53 PM

Posted 09 May 2015 - 04:27 PM


 The world of hacking has become more organized and reliable over recent years and so the techniques of hackers.

Nowadays, attackers use highly sophisticated tactics and often go to extraordinary lengths in order to mount an attack.

And there is something new to the list:

A team of developers has created not one, but two pieces of malware that run on an infected computer’s graphics processor unit (GPU) instead of its central processor unit (CPU), in order to enhance their stealthiness and computational efficiency.
Like Us on Facebook:

The two pieces of malware:

    Jellyfish Rootkit for Linux operating system
    Demon Keylogger

The source code of both the Jellyfish Rootkit and the Demon keylogger, which are described as proof-of-concepts malware, have been published on Github.

Until now, security researchers have discovered nasty malware running on the CPU and exploiting the GPU capabilities in an attempt to mine cryptocurrencies such as Bitcoins.

However, these two malware could operate without exploiting or modifying the processes in the operating system kernel, and this is why they do not trigger any suspicion that a system is infected and remain hidden.



Lucky it's just proof of concept.

Edited by NickAu, 09 May 2015 - 04:32 PM.

BC AdBot (Login to Remove)


#2 paul88ks


  • Members
  • 1,323 posts
  • Gender:Male
  • Location:Dallas,Texas
  • Local time:10:53 PM

Posted 09 May 2015 - 07:53 PM

So is the end result of this not to get online unless you absolutely have to? Or will the war just continue?

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users