TDSS refers to a family of rootkits that target Windows operating systems.
TDSS rootkits are identified with many different names such asAlureon,Tidserv andTDSServ. The first rootkit of its kind was discovered in 2006, usually delivered when a Windows user unknowingly installs trojans from the web. It is often bundled with rogue security software (FakeAV products) as well.
Like other rootkits, it infects low-level system drivers in other to establish itself on the machine. From there it has been used for many illegal purposes, such as mining for data like credit card numbers, user names, passwords and other information that can be pulled from network traffic.
In order to protect itself, TDSS rookits generally block access to websites offering security products or updates for security products. They also block access to Microsoft's Windows Update service, protecting itself from the Malicious Software Removal Tool (MSRT) and also making sure an infected machine cannot be patched automatically against emerging vulnerabilities.
One incident in 2010 involving a TDSS rootkit made the headlines. Microsoft had pushed out an update that changed a hard-coded memory address that the rootkit used, and the result for the end user was an infamousBlue Screen of Death (BSOD). The Windows Update service will no longer deliver this update for systems infected with the rootkits.
Select a term to see the explanation
Select a file extension to see its definition