Internet Anthropologist Think Tank: Yes there are invisible persistent rootkits IPR

  • Search our BLOG

  • HOME
    Terrorist Names SEARCH:

    Friday, September 17, 2010

    Yes there are invisible persistent rootkits IPR


    In fact several kinds.
    The ones NSA uses no one else has.
    RBN and Chinese are less persistent
    but still invisible.

    Some Uber hackers have a different version also.

    The top of the line IPR ( Invisible Persistent Rootkits )
    Are impossible to rid your self of.
    To use a medical analogy, the security systems
    white cells see them as part of the body not
    as an intruder. They hide in plain sight.
    You can format your drives, erase them to
    NSA standards, reinstall the OS from a clean
    CD and the IPR will still be there.
    And the method or vector for deployment is
    classified, and very successful.
    It only needs an IP to to implement.
    We developed this method and sent
    the Air Force a White Paper on it in 2008.
    We had been experimenting  with this
    method since 1999. And developed a
    proof of concept. And it provides a
    universal method to defeat an ongoing
    Bot attack , regardless of size.

    Others on the next level are just very stealthy,
    And have various places to hide, some very
    surprising niches.
    And are kept hidden from security antibodies.
    Many can even hide under a virtual OS.
    These can be spotted when they connect to another
    IP; sometimes.  The trick is to use a faked acceptable
    IP, one that won't cause alarm upon a cursory inspection.

    The Uber hacker IPR I've seen are corrupting the security
    systems, making them lie about whats there.
    Some times these can be spotted by the sound of the Fan
    and comparing the high speed sound of the fan to the 
    performance chart in the Task manger.
    Generally an increase in fan speed and noise will be 
    accompanied by an increase in the use of CPU. as
    indicated on the Task manager chart.
    When the fan increases without an increase in CPU
    usage in the performance chart of the Task manager
    the system should be suspect. The Resource overview
    in the Task manager may also give some clues.
    A IPR may be making the OS lie to you, cloaking its

    I differentiate between them on primary
    method of survival, hiding in plain site,
    stealth, and take over of OS reporting.
    Even though there maybe some over lap.

    IPR's exist, and are a serious threat.
    And I'm not aware of any security suite that
    aquatically addresses the problem.
    There is not even a security suite that addresses
    all known exploits.

     Tactical Internet Systems analyst.

    Cyber attacks growing in number and sophistication

    By HP
    "Few victims realise they are under attack until it is too late. It is increasingly common to hear of attackers remaining inside a compromised organisation for months, gathering information with which they design and build even more sophisticated attacks," TippingPoint said.

    Read more

    Some are never found. G



    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home