IoT botnets are developing at a fast pace, malicious malware created for no other reason than to destroy… and more

 Views: 193
 Date: 2 June، 2018، 12:29 am
IoT botnets are developing at a fast pace, malicious malware created for no other reason than to destroy… and more

With mischief from Russia

Researchers have discovered malware whose aim is nothing more than to cause trouble.

Dubbed StalinLocker it gives a recipient 10 minutes to enter a code or it will try to delete the contents of the computer drives.

The code is revealed by subtracting the date of when the program was executed from the date 1922.12.30, that is, is 30 December 1922.

If the user somehow manages to figure this out within the allotted 10 minutes the malware stops functioning.
There is a code clue though given that the malware displays a screen that shows an image of Stalin while playing the USSR anthem.

However, the number of people who work out that 30 December 1922 is the day when the Union of Soviet Socialist Republics (USSR) came into being, as well as figuring out that the program date needs to subtracted, and all within 10 minutes, is likely to be near zero percent.

Thankfully, the malware is still in development and its early detection means that good internet security software will identify and block it.

Double barrelled malware

The future of malware is likely to be something known as blended threats. What this means is that hackers and cyber criminals will fuse a combination of worms, Trojans, viruses and other kinds of malware into a single malware threat.

Something close to this has already appeared. A PDF document that combines two previously unknown vulnerabilities (known as zero-day threats) has been detected.

It was found on a ‘forum’ of malicious malware samples used by hackers and those who create malware. 
One of the zero-day threats is designed to exploit a vulnerability in Adobe Reader and the other a vulnerability in Microsoft Windows.

These two exploits combine to create a potentially powerful malware strain. Luckily the malware sample doesn’t contain a final payload, such as a banking Trojan, which suggests it was picked up during its early development stages.

That said, a high level of skill was required to put it together which also suggests we may be seeing more blended threats sooner rather than later.

Recent posts
Opening hours: Saturday to Thursday from 10 am to 15 pm, except for holidays.

Support
021-284299