Curated articles, resources, tips and trends from the DevOps World.
Summary: This is a summary of an article originally published by The New Stack. Read the full original article here →
Rootkits have long been a pain in the neck to servers. These collections of malicious programs would hide on servers while allowing their controllers’ administrator-level access to a computer or network.
So, it comes as no surprise that Aqua’s Team Nautilus has found many attackers using advanced persistent threat (APT) techniques to plant rootkits in cloud native containers.
Once in, they remain hidden, and your uninvited visitor grabs data or sets up malware for a bigger, better attack.
And, of course, “rootkits can be used to override functions or binaries in userspace (for example, using LD_PRELOAD).”
Made with pure grit © 2024 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com