latest updates from easySERVICE™
Increasingly, malware exploitation of vulnerabilities in software has become incredibly sophisticated. A perfect example is the Tigger/Syzor malware, which is, according to Symantec iDefense, one of the most sophisticated pieces of malware that exists today. This particular software disables security products in unique ways such as posting malformed messages to windows owned by the daemon processes, sending special byte codes over named pipes, and using the products’ own APIs.
Malware like Tigger installs something called a rootkit to cloak its activities. A rootkit is a malicious program designed to hide the processes and files the attacker installs on the system. It is intended to seize control of the operating system running on the hardware.
The Tigger Trojan also logs keystrokes, gathers system information, and enables a backdoor on the compromised computer. The most scary and unique feature of this resourceful piece of malware is that it’s the first info-stealing malware that goes to the trouble of removing other pieces of malware. Tigger removes all the rogue security software titles to project the façade of “a normally operating computer.”
The Washington Post reports that Tigger claimed more than a quarter-million victims in the span of a few months.
Trends in the industry point to more and more operating systems, application development platforms, and mobile devices requiring signed code before installation. Even when the platform doesn’t require signed code, application users increasingly do.
Whether a target platform requires code signing or not, companies should seize the opportunity to instill confidence and trust in their products. Customer loyalty is more important than ever, and the best way to build a long-term relationship is to consistently deliver the assurance that your product can be trusted.
Code signing allows consumers to feel comfortable downloading software online and helps build credibility in a business’s product and brand. It’s a first line of defense that helps prevent users – both consumers and business users – from falling prey to malware and other vicious online attacks. And it ultimately protects your company’s reputation, online revenue stream, and the bottom line.
Source: Associated Press