![]() The present driver detects and inserts a script inside processes that run on a contaminated PC, with the script quietly stealing information.īureau states that such skilled performances are rarely seen. Moreover, its role resembles very much to the earlier drivers employed by Win32/Stuxnet. The malicious program, known as jmidebs.sys, installs itself as though it is some system driver. Pierre-Marc Bureau, Senior Researcher at ESET, states that the abovementioned driver is of a different kind from those available earlier that were reportedly certified through Realtek Semiconductor Corp, as reported by ESET on July 19, 2010. ![]() The fresh malevolent driver, which came into existence during the 3rd week of July 2010, exploits a certificate that JMicron Technology Corporation (a manufacturer of 'integrated circuits') produced. Security researchers at anti-virus firm ESET state that they have discovered one digitally-signed malicious program associated with the recently found Stuxnet worm. Stuxnet Malware Signed With JMicron Certificate
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |