- Researchers Create Undetectable Rootkit That Targets Industrial Equipment. From Bleeping Computer.
Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world. 32 more words
Tags » Rootkit
Rootkits are usually brought into play at the tail end of an attack cycle. This is why they are referred to as post-exploit tools. Once you’ve got an interface and somehow escalated your privileges to root level, it’s only natural to want to retain access to compromised machine which is also known as plant or foothold. 245 more words