we just need one pvp game with kernel level anti cheat
Leaving aside that security patches should be done, if you install that kind of game on a system where you have any data worth protecting, you’re a dumb ass mtherfcker. Sorry, but seriously, that’s just how it is.
Appoxo@lemmy.dbzer0.com 2 months ago
Probably only on a targeted attack. I don’t see it being a mass target attack like a worm could be.
And in the realm of businesses, how many programs are running in kernel level besides the antivirus/ED(P)R solution?
weker01@sh.itjust.works 2 months ago
And with crowd strike we have seen how reliable Antivirus is.
conciselyverbose@sh.itjust.works 2 months ago
Why not? Malware that survives a full new install is extremely valuable, and there are loads of games adding vulnerabilities with required kernel level rootkits. It’s only a matter of time until one of these vendors is exploited, and why wouldn’t you permanently own the significant chunk of the market with unpatched serious vulnerabilities while you’re at it?
Appoxo@lemmy.dbzer0.com 2 months ago
Again: Mass spread vs target attack.
Remember WannaCry? Yeah, I don’t see that happen.
But (industrial) e-spionage on the other hand? Yup. Will happen 100%
conciselyverbose@sh.itjust.works 2 months ago
For what reason?
Kernel level game anticheats are a great attack vector, and it’s one that inherently identifies and enables distribution to other vulnerable targets. It’s begging to self replicate.
Industrial espionage does not make sense, because most enterprises have, even if imperfect, restrictions on what can be installed on company computers that contain valuable information. You’re not going to get a game with kernel malware on a managed enterprise computer.
possiblylinux127@lemmy.zip 2 months ago
The USB and network stack