Transform, fragment, hide: new mantra for hackers
Malware is being strengthened as more and more new types of code are difficult to detect and remove.
Security researchers at the Trade Conference of the Computer Security Institute in Orlando have warned that hackers with criminal intentions are continuing to promote complex sophistication in working methods and tools. dynamic. Detecting traces and preventing them will become more difficult.
The most common method of malware of this type is the source code conversion technique, designed to evade detection of trace-based malware block tools; Source code fragmentation techniques make it harder to remove and mask source code through rootkits.
Source: antispam Unlike large e-mail-spreading worms like MS Blaster and SQL Slammer, today's malware program is mostly designed around intruding systems.
The main purpose of developing these malware is not only to attack as many systems as possible, but also specifically to steal information and data on the computer.
The way to use diverse source code is constantly changing. Many black hat hackers now also use "packer" to encode malware, avoiding detection. Others use different types of orientations for decoding source code to create unlimited virtual variations.
Typical examples are Swizzor, a Trojan download the program discovered earlier this year. It encapsulates itself in a one-minute cycle to 'bypass' trace-based detection tools that only remove what they know to be malicious. Swizzor also "re-edited" herself after an hour. Source code editing is a sophisticated transformation strategy for hackers to bypass blocking systems.
Many spyware programs have been upgraded with popular encoders or detection techniques to avoid detection. If proprietary encryption algorithms have been used, it is a mistake to use more general algorithms or open source algorithms - Gerhard Eschelbeck, executive director of Webroot Software software company in Boulder, Colorado (USA). ) to speak.
Spyware programs also use kernel level and process block techniques to actively prevent the operation of antispyware software.
According to Ralph Thomas, program manager for malicious code operations at iDefense, the VeriSign branch of Reston (USA), modern malware programs are also being designed in a self-parsing way into several components. same dependency when installed on a system.
Each fragment or component has the ability to identify other components. When removing an element, the remaining components will automatically produce or reinstall themselves immediately. That makes it difficult to remove them from the infected computer.
An example of this type of malware is WinTools, which has been available since 2004. It is installed on the toolbar with three separate components on the hacked system. Any attempt to remove one of the malware's components simply causes other components to change or restart deleted files.
The natural fragmentation of this type of code causes the scripts to be written down to eliminate and see if all the malware has actually been removed or not become more difficult.
The problem is getting more and more complicated when hackers use a rootkit to mask malicious code. Rootkits can be installed at the operating system level or on a kernel level module to hide malicious code and programs from malware detection tools.
A malicious program called Haxdoor - a virus variant that once stole information from 8,500 computers in 60 countries in October is an example. Haxdoor used to steal passwords, keyboard information and screen points on computers that were attacked and send them to remote services.
It is also used to disable system firewalls and hide itself in a rootkit on the compromised machine.
You should read it
- Vault 8: WikiLeaks reveals the source code of the CIA malware control system
- Microsoft publicly released MS-DOS source code on GitHub
- How to View Source Code
- Detecting Android malware can easily steal OTP code without the victim knowing
- Fileless malware - Achilles heel of traditional antivirus software
- Discover a new kind of malicious code that can record the phone call to extort money
- The source code for iOS is revealed on GitHub as 'real goods', this is the time to reveal the biggest information in history
- New malware using web application has turned into a source of attack, very difficult to detect
May be interested
- Download Free Hide IP 4.2.0.6: Simple tool to increase securityfree hide ip is a small program, as the name implies, allows you to hide your ip and replace it with the ip of another country.
- The way Hacker uses to remain anonymoushackers use different ways to remain anonymous while hacking, but it must be said that anonymity is completely unthinkable, but hackers can be safe and anonymous to some degree and ensure backwardness. it is very difficult.
- World hackers in Chinathe wall street journal has revealed some of the chinese hackers' underground world - the focus of hackers in the world today ...
- How to completely hide a folder with a single command on Windowsin the following article, network administrator will guide you how to completely hide a folder with a single command on windows. even if other users gain unauthorized access to your computer and enable the option show hidden files and folder to display the folder, your folder will not be displayed.
- Types of data hiding in Excel - Hide pictures, graphs, rows, columnstipsmake introduce to you part 3: how to hide photos, graphs, drawings, lines, columns in excel
- How to use Media Lock to hide files on Windows 10the media lock application helps you hide files on your computer to avoid being viewed by others and is protected by a password range.
- It's time to change the definition of hackersmost dictionaries define 'hackers' with evil connotations. but now it's time to change this.
- This Chrome Extension Will Help You Hide Google's 'Spam' AI Contenthide gemini is an extension that removes the 'ask gemini' button from gmail, and uses css to hide gemini elements on other google websites.
- 4 free software to hide photos and videos on Android4 android apps allow you to store photos, videos, text messages, call logs into a secret folder on your smartphone without fear of being discovered by others.
- Instructions on how to hide IP addresshiding your ip address while surfing the web in public places will help you avoid the hassle of the internet.