My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2023/12/13 Council Agenda Packet
>
Council Agenda Packets
>
2023
>
2023/12/13 Council Agenda Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/14/2023 8:51:43 AM
Creation date
12/13/2023 5:03:11 PM
Metadata
Fields
Template:
Council Agenda Packet
Date
12/13/2023
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
165
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Download electronic document
View images
View plain text
What Is a Rootkit? How to Defend and Stop Them? I Fortinet https://www.fortinet.com/resources/cybeiglossary/rootkit#:—:text... <br />created hidden kernel threads and hidden systems within Mac machines. <br />3. Zeus: A Trojan horse attack launched in 2007 that targeted banking information using a <br />man -in -the -browser (MITB) attack method, alongside form grabbing and keystroke <br />logging. <br />4. Stuxnet: First discovered in 2010, the first known rootkit to specifically target industrial <br />control systems and cause the equipment they run to malfunction. <br />5. Flame: Discovered in 2012, attacks Windows computers and can record audio, keyboard <br />activity, network traffic, and screenshots. <br />6. Necurs: The rootkit behind one of the biggest active botnets, which was responsible for <br />spreading huge ransomware attacks like the Locky spam and Dridex financial malware. <br />Necurs protects other malware strands, enslaving a machine to the botnet and ensuring <br />the infection cannot be removed. <br />7. ZeroAccess: The rootkit malware that created the ZeroAccess botnet, which eats up <br />resources while mining for Bitcoin and spamming users with ads. The botnet contained up <br />to 2 million machines, most of which was taken down by various security firms and <br />agencies. However, variations of ZeroAccess are still available and active. <br />la <br />Detecting Rootkits - What is a Rootkit <br />Scan? <br />• <br />A rootkit scan is the most effective method for users and organizations to detect rootkit <br />infections. Rootkits are typically difficult for a machine's OS to detect as they are designed to <br />4of 11 <br />12/12/2071 6•11t PM <br />
The URL can be used to link to this page
Your browser does not support the video tag.