Skip to main content

Help Net Security October 7, 2015
Kaspersky Lab experts tracking the activity of the Winnti group have discovered an active threat, called HDRoot, based on a 2006 HDD Rootkit installer. The development of the HDD Rootkit in 2006 is likely to be the work of someone who went on to join the Winnti group when it was set up, likely in 2009. There is a possibility that Winnti made use of third-party software or the utility and source code were available on the Chinese or other cybercriminal black market. Since Kaspersky Lab started to add detections, the group behind the attacks has started to adapt them – in less than one month, a new modification was identified.

Read more here!

Winnti group's attack platform is based on decade old malware - Help Net Security

Winnti group's attack platform is based on decade old malware - Help Net Security
Kaspersky Logo