Security experts say it is common for this virus to infect the system to remain dormant until users access a file or a website that they will activate to feed themselves. data theft. They will then destroy and remove all traces associated with them to avoid detection and destruction.
CyberTrust security expert Brian Denehy says there are a large number of viruses of this type using hidden technology to avoid detection both before and after the attack.
'Suicide' virus - New threat on the Internet Picture 1 This security expert uses the techniques used in the above types of malware not only as technologies known as encryption technology or rookit technology but also include "blockbuster" technology. . This is a technology that enables compression and expansion of the actual file size when executing - a solution that makes it more difficult for search and removal tools.
This is the application technology in about 65% of current malware research surveys.
" Most of us know how to write and delete data on the hard drive. However, that is only the usual way and can still be used with the right tools to recover. In case of the malware mentioned above, deleting the data means that the deletion is completely unrecoverable - it is equivalent to formatting (reformatting) the drive at a low level . "
" Or there are some solutions that use the storage space at the end of each file or fake bad sectors to hide data . these ways are often difficult to detect ," Denehey said. .
During the research process, expert Deheney found that there are still many ways to develop malware as above. However, this future will be an extremely dangerous new danger.