Image: PATRICIA DE MELO MOREIRA / AFP
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.
Advertisement
Karsten Hahn, the security researcher who first found the malware and works for antivirus firm G Data, wrote in a blog post published last week that he and his colleagues were able to find older samples of the malware, dating back to March 2021."What really unsettles me is that this malware was undetected for many months," Hahn told Motherboard. "The worst is the demonstration that this incident shows you can still create kernel mode rootkits for Windows 10 by slipping through the [Microsoft] driver signing process. And that may in turn lead to more threat actors trying this."Do you have more information about this malware? We’d love to hear from you. Using a non-work phone or computer, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, lorenzofb on Wickr and Wire, or email lorenzofb@vice.com
Advertisement
Advertisement