Trellix Advanced Research Center has discovered a malware campaign using Avast’s Anti-Rootkit driver to seize control of systems. The driver is manipulated to disable protection measures using the exploitation of kernel-mode drivers, a rising threat. The malware is dropped into an unseen directory, registered under an alias and set as a service. It is then able to intercept antivirus and other processes, disabling them. Experts recommend implementing measures against such attacks, auditing and updating drivers periodically, and always proactively managing software security.

New supply chain attack hits npm registry, compromising 40+ packages – Security Affairs
New supply chain attack hits npm registry, compromising 40+ packages Security Affairs