Trellix Advanced Research Center has discovered a malware campaign using Avast’s Anti-Rootkit driver to seize control of systems. The driver is manipulated to disable protection measures using the exploitation of kernel-mode drivers, a rising threat. The malware is dropped into an unseen directory, registered under an alias and set as a service. It is then able to intercept antivirus and other processes, disabling them. Experts recommend implementing measures against such attacks, auditing and updating drivers periodically, and always proactively managing software security.

10-Year Health Plan cannot be delivered without ‘cyber resilience’ – Healthcare Leader
10-Year Health Plan cannot be delivered without ‘cyber resilience’ Healthcare Leader


