Results 1 to 3 of 3

Thread: Latest Trend for Spyware Writers

  1. #1
    The ******* Shadow dalek's Avatar
    Join Date
    Sep 2005

    Latest Trend for Spyware Writers

    Looks like the writers of Spyware are ramping it up against the AV and Antispyware programs....

    Stealthy software

    Not all malicious hackers make money by stealing it. 2005 saw large numbers of tech savvy criminals generating significant incomes by compromising computers so people are bombarded with pop-up ads or have their web browser hijacked so it takes them to sites they would not otherwise visit.

    Behind these pop-up bombardments and browser hijackings are so-called adware and spyware programs. These can be contracted by visiting the wrong website which forces the installation of adware; by downloading applications such as file-sharing programs in which the adware lurks or by following a link in an e-mail.

    Virus writers are starting to target online game players
    Online security firm ScanSafe, which cleans up web traffic for customers, said the amount of spyware it had blocked was doubling every month since it started its monitoring program earlier in 2005.

    It also said that the number of web-based attacks that try to install spyware and adware had grown by 165% in the last 12 months.

    Spyware makers were working hard to stop their creations being found said Eldar Turvey, chief executive of ScanSafe.

    "Spyware is becoming more stealthy," said Mr Turvey. Many viruses are designed to be disposable but spyware makers want their creations to persist.

    Many spyware makers were disguising the data their programs send back by making it look like ordinary web browser traffic that easily slips through firewalls.

    One final worrying trend seen in 2005 was the emergence of attacks aimed at security software.

    Many makes of anti-virus, firewall and PC protection programs are seen as a weak link by hacker groups.

    Many are trying to subvert the programs that are supposed to protect users and exploit weaknesses to give them access to users' machines.
    BBC Technology

    It's almost as if each is feeding off of the other???
    PC Registered user # 2,336,789,457...

    "When the water reaches the upper level, follow the rats."
    Claude Swanson

  2. #2
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Which is why I have always recommended a remote hardware device for a firewall. Many of them today implement egress filtering if you bother to look for those that do and it's a lot harder for a piece of software to disable or open ports for ingress on a remote device.

    Software firewalls, like any other software, have their uses and, by their nature, their limitations.
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  3. #3
    Master-Jedi-Pimps0r & Moderator thehorse13's Avatar
    Join Date
    Dec 2002
    Washington D.C. area
    This article is basically saying what myself and other peers have been preeching for a year now. As soon as the scumbags design code that travels over normal channels (HTTP, HTTPS, etc.) your ability and effectiveness to stop and spot the activity will be drastically reduced.

    I've already seen malcode with throttling capabilities over HTTP. Other than netflow analysis (which isn't perfect for many reasons) and pure luck, (because many hueristic engines are infintile presently) you are in a world of $hit.

    Happy New Year.

    Our scars have the power to remind us that our past was real. -- Hannibal Lecter.
    Talent is God given. Be humble. Fame is man-given. Be grateful. Conceit is self-given. Be careful. -- John Wooden

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts