File viruses are only a small part of nowadays malicious code diversified landscape, and yet these ancient malware designed to infect legitimate software by parasitizing its executable routines continue, every now and then, to hit the headlines with news worth the attention. The latest couple of examples of this remarkable endurance ability affects an old but still popular development environment and the most known among CAD (Computer Aided Design) programs.
More than a week after the 1st of April, the day when the Internet stood still because according to the press the Conficker/Downup/Downadup/Kido worm could have destroyed the net, the infrastructures, civilized mankind and the entire planet things are going more or less as usual: Internet remains a dangerous place but it hasn’t exploded like a supernova, and bits are flowing quickly from a part to another one of the planet. The true novelty is that the botnet built up by one of the most complex malware ever finally shows what its true purpose is.
The Conficker worm, also known as Downup, Downadup or Kido, is floating around since October 2008. Security firms know it pretty well, and in the past days the malware has become known as much well to users too having infected a significant amount of machines all over the world. We have returned to the “good” old times of Sasser, Blaster and Mydoom outbreaks, and the already worrisome proliferation of the worm threatens to get even worse because of some conditions that increasingly support its spreading.
From a computer security standpoint, 2008 surely has been a year of passion. Nay worse, it has been a dramatic year characterized by figures beyond any imagination, a steady hammering of new threats that has lasted till the end and that is expected to be the same or even worse during this year.
Trend Micro security enterprise has ranked the attack vectors exploited by the 100 most widespread malware from January to November 2008, and the results speak by themselves: among all the possible infection ways Internet is absolutely the most used (or better still abused) one by worms, trojans and other types of digital pathogenetic agents constantly hunting for victims and unprotected systems to compromise.
It’s a picture full of shadows and few lights the one outlined in the quarterly security report by F-Secure, a well-known Finnish company that produces antivirus software and integrated protection solutions. By analyzing the striking cyber-crime cases reported during the third quarter of 2008, the wrap-up highlights the difficulty to effectively fight an international phenomenon with the only aid from the local laws and the current cooperation treaties between the police authorities.