Trellix Advanced Research Center has discovered a malware campaign using Avast’s Anti-Rootkit driver to seize control of systems. The driver is manipulated to disable protection measures using the exploitation of kernel-mode drivers, a rising threat. The malware is dropped into an unseen directory, registered under an alias and set as a service. It is then able to intercept antivirus and other processes, disabling them. Experts recommend implementing measures against such attacks, auditing and updating drivers periodically, and always proactively managing software security.

Researchers Trace Malware Uses Advanced Evasion To Target Crypto Wallets And Credentials – The420.in
Researchers Trace Malware Uses Advanced Evasion To Target Crypto Wallets And Credentials The420.in


