Common Information
Type | Value |
---|---|
Value |
Rootkit |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may deploy rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting and modifying operating-system API calls that supply system information. Rootkits or rootkit-enabling functionality may reside at the user or kernel level in the operating system, or lower. Firmware rootkits that affect the operating system yield nearly full control of the system. While firmware rootkits are normally developed for the main processing board, they can also be developed for I/O that can be attached to the asset. Compromise of this firmware allows the modification of all of the process variables and functions the module engages in. This may result in commands being disregarded and false information being fed to the main device. By tampering with device processes, an adversary may inhibit its expected response functions and possibly enable Impact. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2025-03-20 | 5 | MITRE ATT&CK T1562.006 Impair Defenses: Indicator Blocking | ||
Details | Website | 2025-03-20 | 5 | 威胁行为者利用旧版驱动绕过 TLS 证书验证威胁网络安全-安全KER - 安全资讯平台 | ||
Details | Website | 2025-03-16 | 6 | 인증서 검증 우회를 통한 Legacy Driver Exploitation 공격 사례 - ASEC | ||
Details | Website | 2025-03-16 | 6 | Legacy Driver Exploitation Through Bypassing Certificate Verification - ASEC | ||
Details | Website | 2025-03-13 | 1 | New OBSCURE#BAT Exploit Windows Alters System Processes & Registry for Evasion | ||
Details | Website | 2025-03-12 | 48 | Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers | ||
Details | Website | 2025-03-12 | 148 | Поддельные репозитории GitHub, созданные с помощью искусственного интеллекта, способствуют распространению SmartLoader и LummaStealer - SEC-1275-1 | ||
Details | Website | 2025-03-12 | 23 | Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers | Google Cloud Blog | ||
Details | Website | 2025-03-11 | 12 | 5 Common Evasion Techniques in Malware - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2025-03-11 | 2 | What is Rootkit – Detection and Prevention | ||
Details | Website | 2025-03-10 | 17 | Stopping Sobolan Malware with Aqua Runtime Protection | ||
Details | Website | 2025-03-09 | 4 | Xeno-Zeronium Free Opensource Anti Malware & Anti Virus Apps For Android OS Gadget (Revision 2025) | ||
Details | Website | 2025-03-08 | 17 | Menguasai Linux untuk Pentesting: Berikut Perintah yang Harus Diketahui! | ||
Details | Website | 2025-03-08 | 24 | 100 PERINTAH LINUX YANG SERING DI GUNAKAN OLEH PENTESTER | ||
Details | Website | 2025-03-08 | 20 | 100 Command Linux yang digunakan oleh Pentester saat berkerja | ||
Details | Website | 2025-03-06 | 8 | 100 Perintah Linux yang Wajib Diketahui: Senjata Para Pentester dalam Dunia Siber | ||
Details | Website | 2025-03-04 | 8 | BlackEnergy v2 Malware Analysis — Memory Dump Investigation | ||
Details | Website | 2025-03-03 | 8 | Walking the File System Like a Hacker | ||
Details | Website | 2025-03-03 | 2 | 2025年十大最佳动态恶意软件分析工具 - 安全牛 | ||
Details | Website | 2025-03-02 | 0 | Sandfly 5.3.1 - Video Overview | ||
Details | Website | 2025-03-02 | 1 | Malware [00] Unlocking the World of Malware Analysis | ||
Details | Website | 2025-03-01 | 0 | Day 106 — The World of Malware: A Deep Dive into Threats and Malware Analysts | ||
Details | Website | 2025-02-28 | 1 | Malware 101: Understanding Threats, Analysis Techniques, and Essential Tools | ||
Details | Website | 2025-02-28 | 1 | 100 Perintah Linux yang paling banyak digunakan oleh Pentester(Penetration Tester). | ||
Details | Website | 2025-02-28 | 0 | Unmasking Auto-Color: The Stealthy Linux Backdoor |