Sunday, January 21, 2007

F-Secure: Storm Worm Starts to Use Rootkit Techniques

Image source: F-Secure

Not good.

Kimmo writes on the F-Secure "News from the Lab" Blog:

The weekend has been very busy with Storm Worm. We have lately found out new variants that have started to use kernel-mode rootkit techniques to hide their files, registry keys and active network connections. F-Secure BlackLight is able to detect the hidden files.

More here.

0 Comments:

Post a Comment

<< Home