Thread: computer VIRUS
View Single Post
  #7  
Old 10-03-2008, 08:40 PM
trader10
WORK IS WHAT YOU MAKE IT

trader10 is offline
 
Join Date: Feb 2008
Location: Sydney
Posts: 43
Yes Phil, there are dozens and dozens of new viruses, malware and spyware getting online everyday....

Intersting article below :

Trojans now bigger threat than virus" says Kapersky

InfoTech
Monday 10 March 2008


If your anti-virus software doesn't track and trap trojans, you are mightily at risk, according to new data from security specialist Kapersky Lab.

Kapersky Labs has released its assessment of threats for 2007 - and it makes startling reading.

The incidence of what we might consider "ordinary" viruses has fallen down the league table of threats. This does not mean that their number has reduced, merely that there are more, and more common, threats of other types. Now, the virus included in files is just the third of five threats listed by the company. However, Kapersky warns against a substantial increase predicted for 2008 - declaring that, amongst others, "they will be developed primarily by Chinese cybercriminals and will target users of online games."

Mobile threats are growing, too, says the company. Trojans (that is malicious programs that hide in the system and send data out) have been identified not just on Windows Mobile but also for Symbian and iPhone. That fifth threat is topped by social networks such as Facebook, MySpace, Blogger, etc. This is estimated to be a highly efficient means of distributing virus and other threats - due to the willingness of users to allow local running of files from the server. Although it doesn't say so, the fear appears to be that hidden malicious code will be attached to files that are saved or forwarded to others.

The second threat, now seen as bigger than the simple virus, is RootKis. These embed themselves at the launch stage of the operation system - some being a particular variation called a "bootkit" which activates as soon as the computer is turned on. They hide in the boot section of the hard disk and have, for some years, been almost impossible to identify and eradicate.

Readers may remember the scandal when Sony used such a tactic to provide anti-copying security for its CDs and DVDs - modifying user's boot-and root- sectors without consent or, at least, without what doctors would call "informed consent."

But what is seen as the largest threat is what Kapersky (clearly in need of a buzzword) are calling "Malware 2.0." Now we've told you that, we'll ignore it as a rather silly term. But the reason behind it is that malware writers have moved into their second generation of product - and it's that which is the biggest threat.

The so called "StormWorm" is the most successful example of this approach so far, says Kapersky: "It demonstrated such a variety of behavior types and spreading methods during the year that each new creation from the unknown virus writers gave antivirus experts yet another headache. Worms in the Zhelatin family incorporate implementations of nearly all the virus writing achievements of the past several years, including rootkit technologies, code obfuscation, botnets that protect themselves against analysis, and communication between infected computers via P2P networks, without a control center.

Zhelatin worms make use of all the existing spreading methods, both traditional (email and instant messaging systems) and new, such as Web 2.0 services (spreading via social networks, including blogs, forums and RSS feeds)."

They warn that banking and game trojans are regarded as primary carriers for this latest and greatest threat.

But Alisa Shevchenko, a malware analyst at Kapersky Lab says that the malware is itself becoming increasingly clever at identifying attempts to seek and destroy it: "virus writers have been forced to find new methods which their creations can use to protect themselves.

Malware self-defense mechanisms can fulfill one or more tasks, including hindering detection of a virus using signature-based methods; hindering analysis of the code by virus analysts; hindering detection of a malicious program in the system; and hindering the functionality of security software such as antivirus programs and firewalls."
Reply With Quote