rootkit

AppWizard
April 7, 2026
Recent findings from McAfee have revealed a malware campaign named Operation NoVoice that has infiltrated over 50 applications on the Google Play Store, which collectively received over 2.3 million downloads before being removed. The malware uses a rootkit attack strategy to gain administrator-level control of Android devices while remaining undetected. Affected apps appeared benign, performing tasks like cleaning files or managing photos, but were secretly communicating with a remote server to send device information. This allowed attackers to deploy custom exploit code, achieving root-level access and posing significant security risks. The malware persists even after factory resets, potentially requiring firmware reinstallation for complete removal. Users with older or unpatched Android versions are at greater risk, as well as anyone who downloaded the compromised apps.
AppWizard
April 3, 2026
Researchers at McAfee Labs discovered that 50 Android applications on the Google Play Store contain malware known as NoVoice, which can grant full remote access to infected smartphones. These apps have over 2.3 million downloads. The malware can communicate with remote servers, profile devices, and download tailored root exploits, potentially compromising specific hardware and software configurations. However, devices with an Android security patch level of May 2021 or later are not vulnerable to these exploits, as the vulnerabilities were patched by Android between 2016 and 2021. Google Play Protect removes these apps and blocks new installs, and users are advised to keep their devices updated with the latest security patches.
AppWizard
April 2, 2026
Researchers at McAfee have identified a malware strain named NoVoice that has infiltrated over 50 applications on the Google Play Store, leading to more than 2.3 million downloads. NoVoice exploits vulnerabilities in older Android kernels and GPU architectures, remaining active even after factory resets. It can inject malicious code into applications like WhatsApp, allowing it to hijack user sessions and spy on private conversations. Google has removed the affected applications, but the malware continues to pose a threat to already compromised devices.
Winsage
October 15, 2025
Microsoft has released security updates for 172 vulnerabilities in October, including six zero-day vulnerabilities. Three of these zero-days are actively exploited: 1. CVE-2025-59230: A local elevation of privilege (EoP) vulnerability in the Windows Remote Access Connection Manager that requires no user interaction. 2. CVE-2025-24990: An EoP vulnerability linked to the Agere Modem driver (ltmdm64.sys), which Microsoft has decided to remove instead of patching due to its legacy nature and associated risks. 3. CVE-2025-47827: A secure boot bypass vulnerability affecting IGEL OS, with a proof of concept available since May, allowing potential kernel-level rootkit deployment. Additionally, three publicly disclosed zero-days remain unexploited: - CVE-2025-0033: A critical vulnerability in AMD EPYC processors using Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP), with no patch available. - CVE-2025-24052: An EoP vulnerability in the Agere Modem driver, similar to CVE-2025-24990. - CVE-2025-2884: An out-of-bounds read vulnerability in TCG TPM2.0 that could lead to information disclosure or denial of service. This month is the last Patch Tuesday for Windows 10 users to receive free updates, after which enrollment in Microsoft’s Extended Security Updates (ESU) scheme will be necessary for continued support.
Winsage
March 17, 2025
Obscure#Bat is a malware campaign targeting Windows users that uses obfuscated batch scripts to deploy a user-mode rootkit, which can hide its activities from standard security measures. It stores hidden scripts in the Windows Registry and can conceal files, registry entries, and running processes through application programming interface hooking. The malware can embed itself within legitimate Windows processes, making it undetectable by conventional security methods, and is capable of deleting evidence of its activity. Attackers use social engineering tactics, such as fake CAPTCHA tests and legitimate software tools, to lure victims into executing the malicious batch file. The rootkit obscures files, processes, or registry keys that begin with the “$nya-” prefix and is identified as an open-source ring-3 rootkit known as r77. It avoids kernel modifications and relies on registry and scheduled tasks for persistence, allowing it to evade detection by traditional kernel-based security tools. Windows users are advised to be cautious of social engineering tactics and to inspect batch files in a text editor before execution.
Tech Optimizer
February 27, 2025
Cybersecurity researchers at Trellix have identified a malware campaign utilizing a legitimate antivirus driver, specifically the Avast Anti-Rootkit driver (aswArPot.sys), to gain kernel-level access and bypass security protocols. The malware, named “kill-floor.exe,” deploys the Avast driver as a file called “ntfs.bin” and registers it as a service using the Service Control utility (sc.exe) to obtain unrestricted privileges. It monitors active processes and terminates security-related processes by communicating with the Avast driver through the DeviceIoControl API. The malware exploits kernel-mode capabilities to execute actions that dismantle system defenses. Organizations are advised to implement BYOVD protection strategies, including detection rules for vulnerable drivers. Key indicators associated with this campaign include the MD5 hashes: 40439f39f0195c9c7a3b519554afd17a (kill-floor.exe) and a179c4093d05a3e1ee73f6ff07f994aa (ntfs.bin).
Winsage
February 11, 2025
February 2025 Patch Tuesday has resulted in a significant update from Microsoft addressing 56 vulnerabilities, including two critical zero-day exploits: CVE-2025-21418 and CVE-2025-21391. CVE-2025-21418 is a vulnerability in the Windows Ancillary Function Driver (AFD.sys) that allows attackers to elevate their privileges on the target system. It requires an authenticated user to run a specially-crafted program that executes code with SYSTEM privileges. Since 2022, there have been nine elevation of privilege vulnerabilities associated with AFD.sys, with one previously exploited as a zero-day. The North Korean APT group, Lazarus Group, previously leveraged a related vulnerability (CVE-2024-38193) to implant a rootkit. CVE-2025-21391 affects Windows Storage across various Windows and Windows Server versions, allowing attackers to delete targeted files and potentially escalate privileges. This vulnerability is noted as the first time the technique has been exploited in the wild. Both zero-days are included in CISA’s Known Exploited Vulnerabilities catalog. Other vulnerabilities addressed include CVE-2025-21194, a security feature bypass affecting Microsoft Surface laptops, and CVE-2025-21377, an NTLMv2 hash disclosure vulnerability that could enable unauthorized authentication. CVE-2025-21376 is a critical remote code execution vulnerability that could be exploited by unauthenticated attackers through crafted requests to vulnerable LDAP servers, with Microsoft indicating that exploitation is likely.
Search