Kernel Attack Fully Compromises Windows Machines


Researchers have demonstrated a new attack method able to compromise the kernel in Windows machines.

On Thursday at the Black Hat conference in Las Vegas, researchers from cybersecurity firm Endgame demonstrated how kernel attacks can go beyond standard malware and exploits to fully compromise a Windows machine with a fileless technique.

As reported by Threat Post, during the session “Kernel Mode Threats and Practical Defenses,” senior Endgame researcher Joe Desimone demonstrated how the Turla Driver Loader could be crafted into a full, fileless kernel-mode attack.

The Turla Driver Loader (TDL), available on GitHub,

To see the full content, share this page by clicking one of the buttons below

You might also like More from author

Click on a tab to select how you'd like to leave your comment

Leave A Reply

Your email address will not be published.