Author: lil_king420Subject: Gpu based paravirtualization rootkit, all os vulne
Posted: 11 April 2018 at 5:42am
Hello again to my 'favorite'
![Clown Clown]()
thread on the interwebz.
I have no new information really, still dealing with this 'problem' and even though I have invested many more hours into researching this, whatever it is, I don't feel any closer to an answer and cannot report any progress this time.
I see a couple new names/posts... welcome!!! And I want to thank explicitly ALL of you who have participated in this thread. I know how most of you feel, this sh*t makes a person truly feel as though we are crazy. Just know you are not alone and that others are still working to expose the malicious wierdness we speak of here.
RFC Rudel's original post was over 6 years ago (incidentally I see his post is missing) but I am glad this thread remains open and unmolested by moderators... with the exception of Rudel's post... however that happened. Anyhow, the reason I am adding another bump to this thread is below...
I wanted to add a link to an MS document that, IMHO, shows MS acknowledging that what we talk about in this thread is no figment of anyone's imagination. I realize the article is basically an advertisement for the Win10 Secure Boot and other errant attempts to secure the windows environment but my point remains, this is MS admitting they cannot protect users...
https://docs.microsoft.com/en-us/windows/security/hardware-protection/secure-the-windows-10-boot-processand I quote, "rootkits have the same rights as the operating system and start before it, they can completely hide themselves and other applications."it goes on to actually define the various incarnations as follows....
Different types of rootkits load during different phases of the startup process:
- Firmware rootkits. These kits overwrite the firmware of the PC’s basic input/output system or other hardware so the rootkit can start before Windows.
- Bootkits. These kits replace the operating system’s bootloader (the small piece of software that starts the operating system) so that the PC loads the bootkit before the operating system.
- Kernel rootkits. These kits replace a portion of the operating system kernel so the rootkit can start automatically when the operating system loads.
- Driver rootkits. These kits pretend to be one of the trusted drivers that Windows uses to communicate with the PC hardware.
@Tink03 - I can speak to your permissions comment in that there absolutely are files and folders in Windows that you do not want access to, for example, the "Application Data" folder. By default even as an administrator, you will get an access denied error. What I have learned the hard way, is that giving yourself full control of this folder results in a redundant loop of symbolic links or junctions that, if allowed to persist will consume an entire hard drive. The permissions of that folder require the group EVERYONE = DENIED. A simple explanation can be found here...
https://answers.microsoft.com/en-us/windows/forum/windows_7-files/multiple-application-data-files-folders-nested/53c5439d-a33f-44da-a0ca-e94bb3e15c1f?auth=1and a more complete explanation is here;
https://www.sevenforums.com/general-discussion/115149-stop-application-data-folder-replicating.html#post990903This is only one example, but there are many instances where one does not want to be able to access something on there own PC. Hopefully this helps a little. Just be mindful of this as ignoring it can and does wreak havoc to the point of bricking a device completely.
So til my next post, stay safe, remain vigilant, avoid speculation and do not give up.
The answer will be found eventually!
Knowledge is free... understand it... then share!