Comments on: Rakshasa hardware backdooring: the demon that can't be exorcized? http://www.welivesecurity.com/2012/07/30/rakshasa-the-demon-that-cant-be-exorcized/ News, Views, and Insight from the ESET Security Community Mon, 03 Feb 2014 08:49:00 +0000 hourly 1 http://wordpress.org/?v=3.7 By: Malware behavior http://www.welivesecurity.com/2012/07/30/rakshasa-the-demon-that-cant-be-exorcized/#comment-1043 Fri, 03 Aug 2012 12:59:38 +0000 http://blog.eset.com/?p=14525#comment-1043 "After all, the malware he’s describing may be ‘ultra-stealthy’ once installed "    is stealthy because malware analysts check only ram/hdd for malware artefacts
Imagine  a dvd-rom modified to download  a trojan from internet every time you put a cd or dvd in your pc, 

]]>
By: David Harley http://www.welivesecurity.com/2012/07/30/rakshasa-the-demon-that-cant-be-exorcized/#comment-1042 Thu, 02 Aug 2012 22:38:50 +0000 http://blog.eset.com/?p=14525#comment-1042 I guess that would be this? http://secureconnexion.wordpress.com/2012/07/27/rakshasa-case-study-really-undetectable/

]]>
By: Jay Pfoutz http://www.welivesecurity.com/2012/07/30/rakshasa-the-demon-that-cant-be-exorcized/#comment-1041 Tue, 31 Jul 2012 19:59:04 +0000 http://blog.eset.com/?p=14525#comment-1041 I wrote an investigative story/case study on Rakshasa. It's more leaning to opinion-based, however. Worth reading.

]]>