We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
 
74,953 News Articles

Tricky malware sidesteps security

Windows machines struggle with Warezov

A tricky malicious program has become more prevalent in spam, but experts don't know what its creators plan to do with it.

Many vendors are rating the malware – called Warezov, Stration and Stratio – as a low risk. But they also say it's tricky to deal with.

The malware is a mass-mailing worm that affects machines running Microsoft's Windows OS (operating system). When the malware infects a computer – usually after the user has opened an attachment containing the worm in a spam email – it sends itself out again to other email addresses found on the computer. The code is then capable of downloading new versions of itself as frequently as every 30 minutes from a batch of websites, said Mikko Hypponen, chief research officer at security firm F-Secure.

Those new versions are created by a program on a server controlled by the hacker, Hypponen said.

In the past, malware has been known to create variations of itself, but the code to create those variations was contained inside the malware. So when a sample was obtained, security analysts could study it and identify potential new versions, he said.

Now, the hacker's program is compiling the code and rapidly churning out new versions, but analysts don't know how the new code is generated.

That characteristic is a headache for security software firms that issue special updates to their software to detect the malware. F-Secure alone has issued at least 150 signatures for the malware.

"It gets very complex to detect an attack like that because the code keeps changing," Hypponen said.

Security firm Sophos has detected some 300 versions of the malware. For October, the malware was one of the most common pieces of malicious code found in spam messages, said Carole Theriault, senior security consultant at Sophos.

Since infected computers look to other domains to receive updated code, F-Secure has worked with ISPs to shut down domains hosting the new variants. So far, nine of 10 domains have been shut down, Hypponen said.

Oddly, the malware doesn't appear to do anything yet on the victim's computers. It's estimated up to a few hundred thousand computers are infected, a sizable number but not quite on the scale of large malware problems from a few years ago, Hypponen said.

A hacker could be waiting to harness enough infected computers to start a denial-of-service attack or send spam or rent out the network to a spammer, Hypponen said.

"We hope to one day find out why they are doing this," Hypponen said. "We hope it's nothing too bad."


IDG UK Sites

Samsung Galaxy Note 4 release date, price and specs 2014

IDG UK Sites

iOS 8 features wishlist: the changes iPhone and iPad users want in Apple's iOS 8

IDG UK Sites

25 Years of the World Wide Web: Happy Birthday, Intenet

IDG UK Sites

Developers get access to more Sony camera features