Technology News

latest updates from easySERVICE™

What Makes Malware So Deceptive



Increasingly, malware exploitation of vulnerabilities in software has become incredibly sophisticated. A perfect example is the Tigger/Syzor malware, which is, according to Symantec iDefense, one of the most sophisticated pieces of malware that exists today. This particular software disables security products in unique ways such as posting malformed messages to windows owned by the daemon processes, sending special byte codes over named pipes, and using the products’ own APIs.

Malware like Tigger installs something called a rootkit to cloak its activities. A rootkit is a malicious program designed to hide the processes and files the attacker installs on the system. It is intended to seize control of the operating system running on the hardware.

The Tigger Trojan also logs keystrokes, gathers system information, and enables a backdoor on the compromised computer. The most scary and unique feature of this resourceful piece of malware is that it’s the first info-stealing malware that goes to the trouble of removing other pieces of malware. Tigger removes all the rogue security software titles to project the façade of “a normally operating computer.”

The Washington Post reports that Tigger claimed more than a quarter-million victims in the span of a few months.

Trends in the industry point to more and more operating systems, application development platforms, and mobile devices requiring signed code before installation. Even when the platform doesn’t require signed code, application users increasingly do.

Whether a target platform requires code signing or not, companies should seize the opportunity to instill confidence and trust in their products. Customer loyalty is more important than ever, and the best way to build a long-term relationship is to consistently deliver the assurance that your product can be trusted.

Code signing allows consumers to feel comfortable downloading software online and helps build credibility in a business’s product and brand. It’s a first line of defense that helps prevent users – both consumers and business users – from falling prey to malware and other vicious online attacks. And it ultimately protects your company’s reputation, online revenue stream, and the bottom line.

Source: Associated Press


One comment on “What Makes Malware So Deceptive

  1. StellarPhoenixS
    July 21, 2014

    Reblogged this on Stellar Phoenix Solutions.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s


This entry was posted on July 17, 2014 by in Malware, Security and tagged , , , , , .
%d bloggers like this: