InvestorsHub Logo
Followers 5
Posts 3002
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Wednesday, 01/05/2022 9:42:15 AM

Wednesday, January 05, 2022 9:42:15 AM

Post# of 249560
Purple Fox rootkit discovered in malicious Telegram installers

https://www.zdnet.com/article/purple-fox-rootkit-discovered-in-malicious-telegram-installers/

Excerpt:

and most of the files "had very low detection rates by AV engines, with the final stage leading to Purple Fox rootkit infection."

"The beauty of this attack is that every stage is separated to a different file which are useless without the entire file set," the team noted. "This helps the attacker protect his files from AV detection."

=================================================================
http://www.wavesys.com/products/wave-endpoint-monitor

Excerpt:

Antivirus software can’t detect rootkits and other malware; it works at the level of the OS and isn’t very good at seeing deeper into the system. For example, it can’t tell whether the boot record is lying. The Wave alternative is to work with the Trusted Platform Modules (TPMs), or security chips, embedded in your devices. By using the TPM to attest to the security of the device each time that device boots, Wave looks below the operating system and can help detect threats lurking there. Every time a device boots up, Wave Endpoint Monitor makes a comparison against previous boot values, and if anything deviates from the norm, it alerts you immediately.

==================================================================
http://www.wavesys.com/malware-protection

Excerpt:

Wave’s solution: start with the device

If antivirus software doesn’t work, what does? The Wave alternative relies not on superficial layers of software but on standards-based hardware: self-encrypting drives (SEDs) and Trusted Platform Modules (TPMs), or security chips, that are already embedded in many of your computers and mobile devices. This hardware provides you with secure storage. When you turn the SED and TPM on and manage them with Wave, you suddenly have a broad, deep view into your network. Among other things, you’ll know immediately whether any one of your devices—computers, laptops, tablets, smartphones—has been tampered with. But Wave is proactive too: you can block the kinds of behaviors that invite malware in. Wave's Endpoint Monitor provides early detection for these low-lying sneaky attacks.


=================================================================
http://www.wavesys.com/

http://www.wavesys.com/contact-information

Contact Wave

Wave Systems
401 Congress Avenue
Suite 2650
Austin, TX 78701
sales@wavesys.com

Gold Customer Support:

goldsupport@wavesys.com

1-800-928-3638

Support:

support@wavesys.com

1-844-250-7077

Sales:

1-877-228-WAVE
















Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.