Skip to main content
Changing face

The Changing Faces of Malware

What Is Malware Anyway?

Malicious software (malware) is a name given to a variety of software designed to interfere with the normal functioning of a single computer, server or a computer network.

Changes in Quantity

We can witness a rapid growth of malware in the last decade.

total malware chart

Changes in How Malware Is Prepared

a) Basic Scripting & Programming (Pre-1990)

Early computer worm "Creeper" was created by Robert H. Thomas in 1971, the program copied into other machines through ARPANET.
In 1981 a boot sector virus "Elk cloner" spread by floppy disk fo Apple II.
In 1986 "Brain" MS-DOS based virus was spread out.
In 1987 there were quite a few viruses released - Win32.Worm.Suriv.A, Cascade.1701, Leigh, etc.

b) Crimeware Development Tool Kits (1990 - 2006)

There were a several basic tool kits like GenVir in 1990, Virus Creation Laboratory (VCL) in 1992, and Phalcon/Skism Mass-Produced Code Generator (PS-MP) in 1993.

Crimeware Development Tool Kits (1990 - 2006)

c) Crime as a service (2007 - now)

Crime-as-a-service the new criminal business model

A professional, continuously evolving, service based criminal industry drives the innovation of tools and methods used by criminals and facilitates the digital underground through a multitude of complementary services, extending attack capacity to those otherwise lacking the skills or capabilities. Refer to http://www.scmagazineuk.com/cybercrime-as-a-service-the-new-criminal-business-model/article/374124/

Crime-as-a-service the new criminal business model

Super Malware as a Key Tool

Malware is becoming increasingly sophisticated, intelligent, versatile, available, and is affecting a broader range of targets and devices.

Case Study 1 - Regin 2014

An advanced piece of malware, known as Regin, has been used in systematic spying campaigns against a range of international targets since at least 2008. A back door-type Trojan, Regin is a complex piece of malware whose structure displays a degree of technical competence rarely seen. Customizable with an extensive range of capabilities depending on the target, it provides its controllers with a powerful framework for mass surveillance and has been used in spying operations against government organizations, infrastructure operators, businesses, researchers, and private individuals.

Case Study 1 - Regin 2014

Refer to http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance

Case Study 2 - Cryptolocker 2013

Spread through email attachments, this ransomware has been seen targeting companies through phishing attacks. Cryptolocker will encrypt users’ files using asymmetric encryption, which requires both a public and private key.
The public key is used to encrypt and verify data, while private key is used for decryption, each the inverse of the other.

Case Study 2 - Cryptolocker 2013


Refer to https://blog.malwarebytes.org/intelligence/2013/10/cryptolocker-ransomware-what-you-need-to-know/

Case Study 3 - Zeus 2007 and its variants till now

Zeus or Zbot is one of the most notorious and widely-spread information stealing Trojans in existence. Zeus is primarily targeted at financial data theft; its effectiveness has lead to the loss of millions worldwide. The spectrum of those impacted by Zbot infections ranges from individuals who have had their banking details compromised, to large public order departments of prominent western governments.

Case Study 3 - Zeus 2007 and its variants till now


Refer to http://malaysiaitfair.com.my/?p=6648

Conclusion

We see increasingly sophisticated malware and the crime-as-a-service business model. The 2014 Internet Organised Crime Threat Assessment (iOCTA) Report suggests the following:

  • Improved general awareness
  • Improved capacity building and training of cybersecurity professionals
  • Joint partnerships in combating malware and its new business models