97% des logiciels malveillants infections sont polymorphes, Les chercheurs disent - Comment, Forum sur la sécurité PC et la technologie | SensorsTechForum.com
NOUVELLES

97% des logiciels malveillants infections sont polymorphes, Les chercheurs disent

shutterstock-malware2015 a une pierre angulaire dans la cyber-sécurité. Et tous les rapports publiés par les éditeurs de sécurité prouvent. De ransomware et botnets Banking, par des attaques ciblées et les violations de données massives, aux campagnes «moyens» sociaux d'ingénierie et le spam, malware researchers have seen nearly anything.

Dans 2016, things could get even worse because malware writers are constantly reinventing their methods and filling the gaps.

Comme nous l'avons dit, reports prove it. Webroot researchers have analyzed more than 27 billion URLs, 600 millions de domaines, 4 billion IP addresses, 20 mobile applications, 10 million connected sensors, et au moins 9 million file behavior records.

More Reports: Botnets bancaires 2015

Polymorphic Malware Is Here to Stay

La conclusion? Dans 97% of the infection cases, malware was found to be polymorphic, or unique to the system. What researchers say is that almost all malware pieces and potentially unwanted programs rely on polymorphism.

What is polymorphism in the field of cyber security?
Let’s take a polymorphic computer virus. It will change its virus signature every time it replicates itself and infects the next file. En faisant cela, the virus will evade detection by AV software.

It’s only logical that the polymorphic method is a large-scale issue. Traditional anti-malware resolutions are at stake, since nearly all analyzed malware samples showed polymorphic patterns of behavior. Some threats displayed such behavior at the server level where every generated executable file was unique. In other instances, the malware piece itself was an example of polymorphism, meaning that it was unique to the victim that ‘received’ it.

There were also major changes in terms of raw counts of malware and PUAs from 2014 à 2015. The number of new malware files increased by 29% from year to year, while the number of PUAs declined by 30% over the same time period. This indicates a significant shift in interest from PUAs to malware, although new PUAs are still roughly twice as common as new malware. It also shows a decline in malicious executables in general; the rate of growth in malware has historically been over 100% each year, so the 2015 rate of 29% marks a major decrease.[...] Now that malware is almost purely polymorphic, attackers are replacing malware variants with other malware variants, instead of replacing one traditional malware instance with many polymorphic instances.

For more information on polymorphic malware, have a look at the whole report by Webroot.

Milena Dimitrova

Un écrivain inspiré et gestionnaire de contenu qui a été avec SensorsTechForum pour 4 ans. Bénéficie d' « M.. Robot » et les craintes de 1984 '. Axé sur la vie privée des utilisateurs et le développement des logiciels malveillants, elle croit fermement dans un monde où la cybersécurité joue un rôle central. Si le bon sens n'a pas de sens, elle sera là pour prendre des notes. Ces notes peuvent se tourner plus tard dans les articles!

Plus de messages

Laisser un commentaire

Votre adresse de messagerie ne sera pas publiée. Les champs obligatoires sont marqués *

Délai est épuisé. S'il vous plaît recharger CAPTCHA.

Partager sur Facebook Partager
Loading ...
Partager sur Twitter Tweet
Loading ...
Partager sur Google Plus Partager
Loading ...
Partager sur Linkedin Partager
Loading ...
Partager sur Digg Partager
Partager sur Reddit Partager
Loading ...
Partager sur Stumbleupon Partager
Loading ...