Hackers are Selling Tool to Hide Malware in GPUs

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

 

Cybercriminals are moving towards malware attacks that can execute code from a hacked system’s graphics processing unit (GPU). Although the approach is not new, and demo code has been published in the past, most of the projects to date have come from academics or were unfinished and unpolished. 
Recently in August, the proof-of-concept (PoC) was sold on a hacker forum, perhaps signaling hackers’ shift to a new level of complexity in their attacks. 
Code Tested on Intel, AMD, and Nvidia GPUs

In a brief post on a hacking forum, someone offered to sell the proof-of-concept (PoC) for a strategy that keeps harmful code protected from security solutions scanning the system RAM. The seller gave a brief description of their technique, claiming that it stores malicious code in the GPU memory buffer and then executes it from there. 
As per the advertiser, the project only works on Windows PCs that support OpenCL 2.0 and above for executing code on various processors, including GPUs. It also stated that he tested the code on Intel (UHD 620/630), Radeon (RX 5700), and GeForce (GTX 740M(? ), GTX 1650) graphics cards. 
However, there are fewer details regarding this new hack, but the post went live on August 8 and was apparently sold for an unknown amount on August 25.
Another hacker forum user mentioned that GPU-based malware had been done before, ci

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: Hackers are Selling Tool to Hide Malware in GPUs