Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - New in-memory rootkit discovered by German hoster->

Submitted by einar2
einar2 (784078) writes "German hoster Hetzner informed customers that login data for their admin surface might have been compromised.
End of last week, a backdoor in a monitoring server was found. Closer examination led to the discovery of a rootkit residing in memory. The rootkit does not touch files on storage but patches running processes in memory. Malicious code is directly injected into running processes. According to Hetzner the attack is surprisingly sophisticated. (link in German)"

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

New in-memory rootkit discovered by German hoster

Comments Filter:

The devil finds work for idle circuits to do.

Working...