
Possibility is to use a DNS service attack to trick the agent intoĬonnecting to a fake C&C server. Running Small Agent to the attacker’s host via ARP-poisoning. Local area network would be to redirect all traffic from a computer Remote code execution creates numerous opportunities for remoteĪttacks in a hostile network environment. The protocol used by the Small Agent provides the basic feature of This has echoes of both Rakshasa and vPro.Īlso, like other corporate rootkits, it increases the attack surface available on the host PC and thereby opens the door to additional malware: Technology is built into the BIOS or firmware of a device during the Smartphone is wiped clean to factory settings. The device is re-imaged, the hard drive is replaced, or if a tablet or They are automatically reinstalled, even if the firmware is flashed, The Absolute persistence module is built to detect when the ComputraceĪnd/or Absolute Manage software agents have been removed, ensuring Absolute persistence technology amounts to a persistent rootkit pre-installed by many device manufacturers (Acer, Asus, Dell, HP, Lenovo, Samsung, Toshiba, etc) to facilitate LoJack for laptops, and other backdoor services:
