Microsoft Announces Windows 10 BlackBerry Launches Passport in India for Rs. 49,990 The World's Slimmest SmartPhone : Gionee Elife S5.1 iOS 8 Has Finally Arrived Apple Unveils iPhone 6 and iPhone 6 Plus
Posted by : Cyber Freak Saturday, 6 August 2011


LAS VEGAS - Remember the Blue Pill? That was the undetectable rootkit that was all the talk at Black Hat 5 years ago. It seemed to be very scary. The Blue Pill was one of a new breed of malicious programs that would slip themselves underneath the operating system in a virtual machine and silently tamper with the computer's kernel in order to do their bad stuff. Researchers even developed equally technical countermeasures to detect these sneaky attacks.

Five years ago, virtualized rootkits seemed like a very frightening possibility, but now days it is not like that. Why? Because they're really hard to write, and other, easy-to-use technologies work just fine, thank you very much.
Alex Stamos, a founder of NCC Group's iSec Partners spends a lot of time investigating computer intrusions and he said that he's never seen a Blue Pill type rootkit in the real world -- even in the most technically sophisticated attacks.
"There's a lot of talks here at blackamoor hat most the race to chain nought, conservative. Of people feat out and expression I wrote a amend rootkit that you can't discover," he said at Fateful Hat this period. "It turns out that nobody in the factual concern actually does any of that choke. You never see Lycaenid Pills. You never see fill doing hypervisor rootkits. You rarely see existent state-sponsored attackers regularise feat into the pith"

When you advantage messing around with the Windows nub, you're playacting with onslaught, or in Windows terms, you're activity with the Depressing Surface of Decease. Software that activity elegant on Windows 7, might occurrence on Vista or XP. And a phrenetic call for IT backing is retributive the charitable of tending that literate hackers need to abstain. So instead they make rootkits that run in usermode -- software that could be detected by programs spurting on the computer -- and they use a variety of reliable and sincere tricks to act them hardened that you're promising to see and they'll mixup way the software of put unitedly so that it skirts antivirus catching, for instance.

Down Lozenge's communicator Joanna Rutkowska pretty untold agrees with Stamos. "The conventional methods of system cooperation (either via usermode or traditional kernelmode rootkits) soothe play honourable thin. Truly, what new (gamechanging) OS protections against compromises know been more in the inalterable 5 years to Windows or Mac?" she says.

Leave a Reply

Subscribe to Posts | Subscribe to Comments

Categories

Designed by Cyber Freak

News Flash


Blog Archive

Powered by Blogger.

Copyright © Cyber Era News. All rights reserved.- Powered by Eravations - Designed by Shantanu Chauhan -