Cybercriminal Sells Tools to Hide Malware in GPUs

Share post:

An individual on a hacker forum recently claimed that they had sold the proof-of-concept for a technique that protects malicious code from security solutions that scan a device’s RAM.

The individual said that the technique uses the GPU memory buffer to store and execute malicious code from there. They also explained that the process only works on Windows systems that support versions 2.0 and higher of the OpenCL framework.

The author says they tested the code on Intel UHD 620 / 630 graphics cards, Radeon RX 5700 and GeForce GTX 740M, and GTX 1650 GPUs.

Although this method is not new, as the demo code was previously released, the sale of the proof-of-concept underscores the fact that hackers are now advancing to a new level of sophistication for their attacks.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways