- Oct 31, 1999
- 30,699
- 1
- 0
Article: http://www.eweek.com/article2/0,1759,1936666,00.asp?kc=EWRSS03129TX1K0000614
So the installed OS is, without its own knowledge, running inside of a hostile VM, if I got this right. They go on to talk about it not being very difficult to do, and what they used it for in their tests (phish Web-serving, keystroke logging, searching the file system, and an antidetection countermeasure).
Just in case it interests someone
The proof-of-concept rootkit, called SubVirt, exploits known security flaws and drops a VMM (virtual machine monitor) underneath a Windows or Linux installation.
So the installed OS is, without its own knowledge, running inside of a hostile VM, if I got this right. They go on to talk about it not being very difficult to do, and what they used it for in their tests (phish Web-serving, keystroke logging, searching the file system, and an antidetection countermeasure).
Just in case it interests someone