Windows 10: New Moriya rootkit stealthily backdoors Windows systems

Discus and support New Moriya rootkit stealthily backdoors Windows systems in Windows 10 News to solve the problem; Unknown threat actors have been employing a Windows rootkit for years to stealthily install backdoors on vulnerable machines. In a campaign dubbed... Discussion in 'Windows 10 News' started by Brink, May 7, 2021.

  1. Brink Win User

    New Moriya rootkit stealthily backdoors Windows systems


    Unknown threat actors have been employing a Windows rootkit for years to stealthily install backdoors on vulnerable machines.

    In a campaign dubbed Operation TunnelSnake by Kaspersky researchers, the team said on Thursday that an advanced persistent threat (APT) group, origin unknown but suspected of being Chinese-speaking, has used the rootkit to quietly take control of networks belonging to organizations.

    Rootkits are packages of tools that are designed to stay under the radar by hiding themselves in deep levels of system code. Rootkits can range from malware designed to attack the kernel to firmware, or memory, and will often operate with high levels of privilege.

    According to Kaspersky, the newly-discovered rootkit, named Moriya, is used to deploy passive backdoors on public-facing servers. The backdoors are then used to establish a connection -- quietly -- with a command-and-control (C2) server controlled by the threat actors for malicious purposes.

    The backdoor allows attackers to monitor all traffic, incoming and outgoing, that passes through an infected machine and filter out packets sent for the malware.


    Read more:

    :)
     
    Brink, May 7, 2021
    #1
  2. Sasqui Win User

    6 Rootkit Detector Programs reviewed & compared: INTERESTING READ!

    Cool find - Rootkit Unhooker 3.0 looks like it kicks butt.
     
    Sasqui, May 7, 2021
    #2
  3. Sophos Anti-Rootkit 1.3.1

    Sophos Anti-Rootkit finds and removes any rootkit that is hidden on your computer. Removing rootkits without compromising system integrity is particularly challenging and needs to be done with care.
    Latest Changes:

    * Enhanced detection and cleanup facilities
    * Users can install and uninstall Sophos Anti-Rootkit using standard Windows procedures (i.e. the Windows Start menu, and the Windows Add/Remove Programs menu option)
    * The file sarscan.log is cumulative and is timestamped. The file sarclean.log is cumulative and is not timestamped
    * Scans running processes, windows registry and local hard drives for rootkits
    * Identifies known rootkits and selects, by default, files for removal which will remove the rootkit component of the malware without compromising OS integrity
    * Allows users to remove unidentified hidden files, but does not allow removal of essential system files when hidden by an identified rootkit
    * Once the user has run a scan, the screen prompts the user through the necessary steps until every rootkit has been removed
    * Users can switch between the GUI and command-line functionality
    * Both context sensitive and command-line help are available

    Website
     
    HellasVagabond, May 7, 2021
    #3
  4. New Moriya rootkit stealthily backdoors Windows systems

    Alec§taar, May 7, 2021
    #4
Thema:

New Moriya rootkit stealthily backdoors Windows systems

Loading...
  1. New Moriya rootkit stealthily backdoors Windows systems - Similar Threads - Moriya rootkit stealthily

  2. Rootkit

    in Windows 10 Software and Apps
    Rootkit: Hello , so ive been rootkitted by a .jar file , i tried to rest the whole pc but it seems like its still in my pc beacuse my stuff is still getting stolen , i tried to do scans and install anti virus but nothing is working , if i did a hardware replace will it get rid of the...
  3. backdoor virus

    in Windows 10 Gaming
    backdoor virus: want to remove backdoor virus but not able to remove that with window defender https://answers.microsoft.com/en-us/windows/forum/all/backdoor-virus/34107b33-a39e-408d-95b8-66d279b9408d
  4. rootkit

    in Windows 10 Gaming
    rootkit: HiWhat are rootkits on my desktop via MALWARE bytes?Thank youTIMMY 2 TOES https://answers.microsoft.com/en-us/windows/forum/all/rootkit/07a0f6b2-1909-4285-98dd-e31b72c3192d
  5. rootkit

    in Windows 10 Software and Apps
    rootkit: HiWhat are rootkits on my desktop via MALWARE bytes?Thank youTIMMY 2 TOES https://answers.microsoft.com/en-us/windows/forum/all/rootkit/07a0f6b2-1909-4285-98dd-e31b72c3192d
  6. rootkit

    in Windows 10 BSOD Crashes and Debugging
    rootkit: HiWhat are rootkits on my desktop via MALWARE bytes?Thank youTIMMY 2 TOES https://answers.microsoft.com/en-us/windows/forum/all/rootkit/07a0f6b2-1909-4285-98dd-e31b72c3192d
  7. backdoors

    in AntiVirus, Firewalls and System Security
    backdoors: My pc recently I think got hacked because windows defender keeps saying everyday that i have new backdoors in files like spotify , nvcontainer , amd , etc. Can you guys help me fix this because I dont want my pc to blue screen. Thanks!...
  8. Rootkits

    in AntiVirus, Firewalls and System Security
    Rootkits: I have been searching the internet and nowhere can I find an answer concerning how are these installed on or in a system.Am I to assume that something like this 'rootkit' may be installed by USB or downloaded from a website, considering the word 'installed' implies this?Can...
  9. Rootkit

    in AntiVirus, Firewalls and System Security
    Rootkit: Can a Rootkit be Totally annihilated by Scanning through Defender? What if it is deeply embedded in the OS itself, finding root on some apps or file or even in user and kernel levels. This is my problem cause my secondary Laptop came pre installed apps and Rootkit, of which I...
  10. Backdoor/rootkit found preinstalled on 3 million Android phones

    in Windows 10 News
    Backdoor/rootkit found preinstalled on 3 million Android phones: Firmware that actively tries to hide itself allows attackers to install apps as root. Almost three million Android phones, many of them used by people in the US, are vulnerable to code-execution attacks that remotely seize full control of the devices, researchers said...