97% af Malware Infektioner er polymorfe, Forskere Sig - Hvordan, Teknologi og pc-sikkerhed Forum | SensorsTechForum.com
NYHEDER

97% af Malware Infektioner er polymorfe, Forskere Sig

Shutterstock-malware2015 har en hjørnesten i cybersikkerhed. Og alle de rapporter udgivet af sikkerhed leverandører bevise det. Fra ransomware og bank botnets, gennem målrettede angreb og massive brud på datasikkerheden, til ”gennemsnitlige” social engineering og spam-kampagner, malware researchers have seen nearly anything.

I 2016, things could get even worse because malware writers are constantly reinventing their methods and filling the gaps.

Ligesom sagde vi, reports prove it. Webroot researchers have analyzed more than 27 billion URLs, 600 million domæner, 4 billion IP addresses, 20 mobile applications, 10 million connected sensors, og mindst 9 million file behavior records.

More Reports: Banking botnet 2015

Polymorphic Malware Is Here to Stay

konklusionen? I 97% of the infection cases, malware was found to be polymorphic, or unique to the system. What researchers say is that almost all malware pieces and potentially unwanted programs rely on polymorphism.

What is polymorphism in the field of cyber security?
Let’s take a polymorphic computer virus. It will change its virus signature every time it replicates itself and infects the next file. Ved at gøre det, the virus will evade detection by AV software.

It’s only logical that the polymorphic method is a large-scale issue. Traditional anti-malware resolutions are at stake, since nearly all analyzed malware samples showed polymorphic patterns of behavior. Some threats displayed such behavior at the server level where every generated executable file was unique. I andre tilfælde, the malware piece itself was an example of polymorphism, meaning that it was unique to the victim that ‘received’ it.

There were also major changes in terms of raw counts of malware and PUAs from 2014 til 2015. The number of new malware files increased by 29% from year to year, while the number of PUAs declined by 30% over the same time period. This indicates a significant shift in interest from PUAs to malware, although new PUAs are still roughly twice as common as new malware. It also shows a decline in malicious executables in general; the rate of growth in malware has historically been over 100% each year, so the 2015 rate of 29% marks a major decrease.[...] Now that malware is almost purely polymorphic, attackers are replacing malware variants with other malware variants, instead of replacing one traditional malware instance with many polymorphic instances.

For more information on polymorphic malware, have a look at the whole report by Webroot.

Milena Dimitrova

En inspireret forfatter og indhold leder, der har været med SensorsTechForum for 4 år. Nyder ’Mr. Robot’og frygt’1984’. Fokuseret på brugernes privatliv og malware udvikling, hun tror stærkt på en verden, hvor cybersikkerhed spiller en central rolle. Hvis almindelig sund fornuft giver ingen mening, hun vil være der til at tage noter. Disse noter senere kan blive til artikler!

Flere indlæg

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...