Appeared super risk of computer underground GPU exploitation
Graphics processing chips (GPUs) are known to have much higher computing power than the main processor chips (CPUs). If used for good purposes, the GPU will be very beneficial. But if bad guys take advantage of GPU, the consequences will be very unpredictable.
Rombertik malware appears to attack hard drive and delete MBR
Like many other programs ( applications ), the virus is essentially a software and its " destructive " capability is also dependent on the power of computer hardware, which has relied on CPU for many years. But with technology development, CPUs are no longer the most powerful chip a machine can own. If your computer is equipped with a GPU ( or graphics card ), it is likely that its computing power ( measured by FLOPS ) will be higher than the current CPU.
A NVIDIA graphics card
In fact, taking advantage of GPU for " non-transparent " purposes has existed for a long time. For example, unlock the phone, break the login password, break the Wi-Fi password . mainly based on the GPU. However, the above programs run on hacker / cracker computers, not users and are basically not dangerous by viruses. But a recently published tool shows the threat of viruses running on GPUs completely.
A group of application developers called Jellyfish has released a set of rootkits ( a software that runs in the background ) and a keylogger ( keyboard monitoring software ) that runs on Linux, with a remote access tool (RAT) available. for Windows. These programs are in common, based on the OpenCL programming interface, an interface that allows applications to exploit both the power of CPU and GPU. The generation of chips released in recent years by AMD, Intel and NVIDIA mostly supports OpenCL.
The danger is that ANTIVIRUS has not detected malicious code running on the GPU
But the most dangerous thing about these malware (malware) is that antivirus (antivirus) programs are currently unable to identify them if they are running on the GPU. Most antivirus only recognize malicious code when they run on the CPU. Therefore, although the programs that Jellyfish wrote are only for the purpose of raising people's vigilance. But it is possible that there have been many viruses based on GPUs that have been launched and are " launching themselves " on users' computers even though they have built-in antivirus.
Not long ago, μTorrent users had trouble installing the EpicScale application to plow " virtual money " Bitcoin. The case was discovered and quickly resolved. But if this happened once, we are not sure whether it will happen until Monday or Tuesday. Because the number of new viruses is still constantly born and because there are always bad people who want to take advantage of your computer or smartphone.
You should read it
- Compare 4 current TV operating systems
- Instructions for installing Linux operating system on Chromebook
- Compare the most popular Linux distributions today
- How to Install Linux Mint Operating System
- The Korean government is going to use the Linux operating system instead of Windows because of the expensive cost
- The best 5 dock for Linux
- 12 best Linux server operating systems
- Install Windows Vista on Mac using Boot Camp
May be interested
- How to exit the quick underground application on iPhone Xturning off applications running in the background on iphone x requires a lot of steps. however, we can shorten the operation to turn off the application running in the background on iphone x.
- Technology buries 100 tons of CO2 underground every daystartup oman 44.01 has developed a new technology that can trap co2 - a planet-warming gas - permanently underground, removing large amounts of this gas from the atmosphere.
- Underground water dominates the migration of human ancestors in East Africaa new study shows that underground spring water is necessary for the movement of the original human ancestors in east africa.
- How to check if your computer is being monitoredin today's technological age, the exploitation of personal data is much more common, there are many bad guys using computer tracking to exploit, track and steal information.
- How to block apps running on Android?applications running in android are both memory-intensive and fast-consuming. therefore to save battery and memory of your android device, you should block these applications.
- Is this an underground alien underground base in Antarctica?using google earth, people discovered two secret entrances in antarctica. according to ufo hunters this may be the entrance of the underground military base or alien base. they even discovered that there was a flying disc-like object near the entrance to one of the two caves.
- How to turn off, disable Cortana running underground on Windows 10 thoroughlyhow to turn off, disable cortana running underground on windows 10 thoroughly. microsoft has created cortana digital virtual assistant to effectively support windows 10 users with features such as setting reminders, natural voice recognition without typing
- Unbelievable but true, CAT in the world began to run outwe still think sand is endless because the beaches with white sand stretches, the vast desert is expanding. but actually, the amount of sand in the world is declining seriously, affecting the environment and dangerous for humans.
- Risk of virus infection from browser and preventionplugins are preferable targets. plugin vulnerabilities can be exploited on all browsers and on many different operating systems. a flash plugin vulnerability could be exploited to exploit chrome, firefox or internet explorer on computers running windows, linux or mac operating systems.
- Google and many other large technology companies are quietly deploying projects that can change the internet worldgoogle has pocketed billions of dollars in revenue from cloud-based services, and now, they are using this money to invest in a great project, which can have a profound effect on the entire internet world - that is the underground cable 'backbone', connecting the two continents of the american continent.