O'Reilly logo

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition by Aaron LeMasters, Sean M. Bodmer, Michael A. Davis, Christopher C. Elisan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART II

ROOTKITS

CASE STUDY: The Invisible Rootkit That Steals Your Bank Account Data

Let’s go back to a time when a new form of rootkit was introduced that rocked the industry. In 2008, a rootkit appeared in the wild, stealing financial data by installing keyloggers on computers and monitoring when users entered their usernames and passwords for many European banks. This rootkit was the most malicious of its kind ever seen. Invisible to all anti-rootkit and anti-malware utilities, including those from leading security and antivirus vendors, this rootkit downloaded malware that logged all keystrokes typed into the computer. Between December 12, 2007, and January 7, 2008, iDefense, a security firm owned by Verisign, detected approximately 5000 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required