An analysis of the Uroboros rootkit, tied to the Turla APT group, reveals a highly sophisticated design that embeds into the operating system. Uroboros can monitor and hijack newly created processes, injecting malicious design into the system’s lifecycle. It targets trusted processes and uses legitimate Windows drivers for network persistence, evasion and stealthy communication. Furthermore, it employs a customised HTTP protocol to blend malicious traffic with regular internet activity. The study underlines Uroboros as an intricate and formidable tool that symbolises architectural subversion and the evolving landscape of cyber threats.

FBI warns of ongoing scam that uses deepfake audio to impersonate government officials
The FBI has issued a warning about a malicious messaging campaign using deepfake technology, or AI-generated voice audio, to impersonate senior US government officials. The