Monday, January 22, 2007

Storm Worm using Rootkit techniques

The weekend has been very busy with Storm Worm. We have lately found out new variants that have started to use kernel-mode rootkit techniques to hide their files, registry keys and active network connections.

F-Secure BlackLight is able to detect the hidden files. These variants are now detected as W32/Stormy.AB and Trojan-Downloader.Win32.Agent.bet.

Source : F-Secure

0 Comments:

Post a Comment

<< Home