From the past to the future, the new bootkits menace

August 10, 2009 · Filed Under In Depth, Security · Comment 

In Depth - A merciless lens pointed on the hot topics, passionate and detailed retrospectives, reflections beyond the appearances As security experts have already highlighted in this months and years, the trend of the most sophisticated malicious code is to be able to reach the lowest levels of the machine to infect, putting out of the game all the security mechanisms and gaining full control of the PC and the operating system. This trend embraces more and more the term “bootkit”, literally a bootable rootkit, on which the attentions of researchers and Assembly code enthusiasts have recently focused uncovering new, potential threats with an ancient heart and dangerous security flaws sold as malware-proof security measures.

Read more

Rootkits penetrate the heart of the machine

April 7, 2009 · Filed Under In Depth, Security · Comment 

In Depth - A merciless lens pointed on the hot topics, passionate and detailed retrospectives, reflections beyond the appearances Since, in 2005, the nasty commercial policies of Sony BMG uncovered the possibility to seize control on the operating system to hinder the normal working of the PC and peripherals, the evolution of rootkit software went through an unparalleled acceleration. The interest for the matter rose in research and among cyber-criminals gangs, with the result that can be esteemed in these days: rootkits have reached the lowest levels of electronic devices circuitry by infecting network routers, the BIOS and even the most privileged working mode of the x86 processors.

Read more