/* Javascripts
----------------------------------------------- */
/* * * * * * * BODY * * * * * * *
----------------------------------------------- */
Article by John Leyden in The Register says:Sony-BMG's rootkit DRM technology masks files whose filenames start with "$sys$". A newly-discovered variant of of the Breplibot Trojan takes advantage of this to drop the file "$sys$drv.exe" in the Windows system directory.
"This means, that for systems infected by the Sony DRM rootkit technology, the dropped file is entirely invisible to the user. It will not be found in any process and file listing. Only rootkit scanners, such as the free utility RootkitRevealer, can unmask the culprit," warns Ivan Macalintal, a senior threat analyst at security firm Trend Micro.
[+/-] show/hide this post
0 Comments:
Post a Comment
<< Home