Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
Cyber security experts have recently identified a sophisticated cryptojacking campaign that employs a new type of malware named “GhostEngine.” This malware leverages vulnerable drivers to disable endpoint detection and response (EDR) systems, allowing attackers to remain undetected while they mine cryptocurrency.
GhostEngine is a malware designed to exploit vulnerabilities in legitimate software drivers, a technique known as Bring Your Own Vulnerable Driver (BYOVD). This method allows attackers to disable security measures by loading compromised drivers into the system, which operate with high privileges and can terminate security processes.
Detecting GhostEngine can be challenging due to its ability to disable logging and security processes. However, certain behaviours and signs can indicate its presence:
The GhostEngine malware represents a significant threat due to its sophisticated techniques and ability to disable advanced security solutions. Organisations must remain vigilant and implement proactive measures, such as updating vulnerable driver blocklists and monitoring for signs of malicious activity. By understanding and anticipating these threats, businesses can better protect their networks and data from such stealthy attacks.
For more in-depth technical details and ongoing updates about GhostEngine, refer to the following sites: