Home Cyber Crime Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs

Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs

11
0


Cybercriminal sells tool to hide malware in AMD, NVIDIA GPUs

Cybercriminals are making strides in the direction of assaults with malware that may execute code from the graphics processing unit (GPU) of a compromised system.

Whereas the strategy is just not new and demo code has been printed earlier than, tasks up to now got here from the educational world or had been incomplete and unrefined.

Earlier this month, the proof-of-concept (PoC) was bought on a hacker discussion board, probably marking cybercriminals’ transition to a brand new sophistication degree for his or her assaults.

Code examined on Intel, AMD, and Nvidia GPUs

In a brief put up on a hacker discussion board, somebody supplied to promote the proof-of-concept (PoC) for a method they are saying retains malicious code protected from safety options scanning the system RAM.

The vendor supplied solely an summary of their technique, saying that it makes use of the GPU reminiscence buffer to retailer malicious code and execute code.

In line with the advertiser, the mission works solely on Home windows techniques that assist variations 2.0 and above of the OpenCL framework for executing code on numerous processors, GPUs included.

The put up additionally talked about that the writer examined the code on graphics playing cards from Intel (UHD 620/630), Radeon (RX 5700), and GeForce (GTX 740M(?), GTX 1650).

Hacker sells proof-of-concept for GPU-based malware
supply: BleepingComputer

The announcement appeared on August 8. About two weeks later, on August 25, the vendor replied that that they had bought the PoC with out disclosing the phrases of the deal.

One other member of the hacker discussion board indicated that GPU-based malware has been accomplished earlier than, pointing to JellyFish – a six-year PoC for a Linux-based GPU rootkit.

In a tweet on Sunday, researchers at VX-Underground risk repository mentioned that the malicious code permits binary execution by the GPU in its reminiscence area. Additionally they added that they may exhibit the approach within the close to future.

Tutorial analysis

The identical researchers behind the JellyFish rootkit additionally printed PoCs for a GPU-based keylogger and a GPU-based distant entry trojan for Home windows. All three tasks had been printed in Might 2015 and have been publicly accessible.

The vendor rejected the affiliation with the JellyFish malware saying that their technique is totally different and doesn’t depend on code mapping again to userspace.

There aren’t any particulars in regards to the deal, who purchased it and the way a lot they paid. Solely the vendor’s put up that they bought the malware to an unknown occasion.

Whereas the reference to the JellyFish mission means that GPU-based malware is a comparatively new concept, the groundwork for this assault technique has been set about eight years in the past.

In 2013, researchers the at Institute of Pc Science – Basis for Analysis and Know-how (FORTH) in Greece and at Columbia College in New York confirmed that GPUs can host the operation of a keylogger and retailer the captured keystrokes in its reminiscence area [PDF paper here].

Beforehand, the researchers demonstrated that malware authors can make the most of the GPU’s computational energy to pack the code with very advanced encryption schemes a lot quicker than the CPU.



Source link