'Suicide' virus - New threat on the Internet
The 'suicide' virus - a virus capable of destroying all signs of its own existence after completing the task - is now becoming a new threat on the Internet.
The "suicide" virus - a virus capable of destroying all signs of its own existence after completing the task - is now becoming a new threat on the Internet.
Security experts say it is common for this virus to infect the system to remain dormant until users access a file or a website that they will activate to feed themselves. data theft. They will then destroy and remove all traces associated with them to avoid detection and destruction.
CyberTrust security expert Brian Denehy says there are a large number of viruses of this type using hidden technology to avoid detection both before and after the attack.
This security expert uses the techniques used in the above types of malware not only as technologies known as encryption technology or rookit technology but also include "blockbuster" technology. . This is a technology that enables compression and expansion of the actual file size when executing - a solution that makes it more difficult for search and removal tools.
This is the application technology in about 65% of current malware research surveys.
" Most of us know how to write and delete data on the hard drive. However, that is only the usual way and can still be used with the right tools to recover. In case of the malware mentioned above, deleting the data means that the deletion is completely unrecoverable - it is equivalent to formatting (reformatting) the drive at a low level . "
" Or there are some solutions that use the storage space at the end of each file or fake bad sectors to hide data . these ways are often difficult to detect ," Denehey said. .
During the research process, expert Deheney found that there are still many ways to develop malware as above. However, this future will be an extremely dangerous new danger.
Hoang Dung
You should read it
- Modular Malware - New stealth attack method to steal data
- The 4 most common ways to spread malware today
- Keysight's security expert warns against the new cyber attack process
- Cisco launched a technology to identify malicious code on encrypted traffic
- Sophisticated spam Trojan unmatched
- Detecting Android malware can easily steal OTP code without the victim knowing
- What is FormBook Malware? How to remove?
- What is BBBW Malware? How to remove and restore data?
- Malware stored in Google Sites sends data to the MySQL server
- Malware will not be detected
- How many types of malware do you know and how to prevent them?
- 10 typical malware types