Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
New Phoenix Keylogger
- This topic has 0 replies, 1 voice, and was last updated 1 year, 2 months ago by .
-
Topic
-
A new keylogger called Phoenix that started selling on hacking forums over the summer has now been linked to more than 10,000 infections. The malware tries to stop 80 security processes before it starts running to remain undetected. Phoenix also steals credentials within seconds, there is no need for a persistent after boot infection. Phoenix has also gained an aggressive anti-AV and anti-VM. What this does is keeps the malware from being detected. In the article there’s a large list of all the things that Phoenix will shut down in order to go unseen. Many of these are well known security systems.
You must be logged in to reply to this topic.