Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Keep The TechnoWorldInc.com Community Clean: Read Guidelines Here.
Recent Updates
[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[April 12, 2025, 01:54:20 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[March 12, 2025, 03:05:30 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[January 03, 2025, 03:29:12 PM]

[November 08, 2024, 04:31:03 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Techno News
 Darwin’s theory seems to apply to malware
Pages: [1]   Go Down
  Print  
Author Topic: Darwin’s theory seems to apply to malware  (Read 653 times)
RealWire
TWI Hero
**********



Karma: 0
Offline Offline

Posts: 18530


View Profile Email
Darwin’s theory seems to apply to malware
« Posted: September 19, 2012, 07:32:48 PM »


G Data’s newest Malware Report shows surprising new trend in cybercrime

Bochum (Germany), 19 September 2012 – G Data’s newest Malware Report, which was published today, shows a new and unexpected development in malware: the extreme growth of new malicious programs seems to be slowing down. Granted, the antivirus industry still needed to develop 1,381,967 new virus signatures to detect and block all new malware in the first semester of this year, which is an all time high. But the number is not as high as was to be expected: the figure is only marginally bigger (3.9%) than the 1,330,146 new malware types that were found in the semester before that. But according to the experts at G Data, this does not give anyone any reason to be relieved. The new malware that appeared this year has been the smartest code yet, suggesting an evolution not dissimilar to Darwin’s evolution theory.

Over the past ten years, security experts have become used to seeing extreme growth in new malware types. “Clearly more and more time was spent worldwide on writing malicious code to infect computers all over the world. Writing malware seemed to have become an easy trade to make some good money. But, at the same time, potential victims all over the world smartened up and weren’t as easily fooled anymore. This seems to have its effect on the malware writing profession now. Only the smarter malware writers, who manage to change their way of working along with the changing circumstances seem to be surviving economically,” says Eddy Willems, Security Evangelist at G Data. “Adapting quickly to survive the changing circumstances is pretty much the definition of Darwin’s evolution theory.”

Smarter malware
A good example of smarter malware is a modern banking Trojan. In G Data’s Malware Report the evolution is explained:
“Most past attack schemes were relatively simple. For example, when a victim logged into online banking, he was prompted to enter a large number of TANs, which were then forwarded to the attacker. […] Newer methods are more sophisticated: In so-called Automatic Transfer System (ATS) scheme, the entire theft takes place without customer interaction. Account balances and lists of transactions are also manipulated in such a way that the victim does not notice the theft.”

Another example can be found with malware for Android:
“In the year 2011, most of the malware for mobile devices that was circulated still focused on the quick buck […] and could mainly be found on websites or on third-party markets. […] 2012 marked the appearance of completely reprogrammed or even new original apps that provided the full scope of functions advertised but also contained the hidden malicious functions. This had the effect that even the official Google Play Store could distribute malware for several days or even weeks before it was discovered.”

Quality over Quantity
The best example of why quality is more important than quantity for malware writers is the Flashback-virus for Apple. “In the first half of 2012, there have been only a few viruses for Mac OS. In fact, there were fewer new threats for Apple this semester, than there were in the two previous semesters. But one high quality virus, Flashback, did the trick. It infected more Apple machines (well over 600,0000) than have ever been infected before, “ says Eddy Willems.

The future
The analysts at G Data SecurityLabs think the growth number of malicious programs will stabilize completely, but the quality of the malware will rise even further. Eddy Willems: “I suspect we will be looking at 2.5 to 3 million new threats every year from now on. Quality will triumph over quantity in the underground economy. It has to, because people are understanding the online dangers better and are getting more cautious every day. In order to be successful as a malware writer, more time and thought needs to be put into creating even more deceitful and conniving schemes. And we, as part of de AV industry, have our work cut out for us.”

G Data’s Malware Report can be downloaded from this link: http://www.gdatasoftware.co.uk/uploads/media/GData_MWR_1_2012_EN_01.pdf.

About G Data Software AG
Bochum-based G Data Software AG is an innovative and rapidly expanding software house that specialises in IT security solutions. A specialist in Internet security and pioneer in the field of virus protection, the company was founded in Bochum in 1985 and developed the first antivirus program 25 years ago.

This makes G Data one of the oldest security software companies in the world. For more than five years, no other European security software provider has won more national and international tests and awards than G Data. The product range comprises security solutions for end customers as well as medium to large-sized enterprises. G Data security solutions are available in more than 90 countries worldwide.

More information about the company and the G Data Security solutions is available at http://www.gdatasoftware.co.uk/.

Editorial contact:
Daniëlle van Leeuwen
Tel: +31 (0) 20 8080835
Email: [email protected]

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.159 seconds with 23 queries.