Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Context Uncovers Primitive Tactics within Modern Malware

Context Information Security, which conducted one fresh research, found that a malware family known as a "most advanced global cyber-espionage operations to date" was utilizing virus tactics of the old school.

During February 2014, Kaspersky the Internet security firm exposed malicious software called 'Careto' or 'The Mask' both meaning the same while the former is in Spanish, when Kaspersky stated that the attack seemed as state-backed while had its origin in Spain.

However, although the malware is complex, Context's experts have exposed the code's classic methods that virus-authors belonging to the 1980s and 1990s ordinarily employed.

Careto utilizes file-attaching technique for impairing a computer's boot process that Context says is certain historic tactic, letting malware to run immediately at the time of the OS' activation.

Context's Senior Researcher Kevin O'Reilly states that whilst The Mask or Careto remains concealed behind its complexity, it employs a popular mechanism that of contaminating the foremost .exe file which becomes active on Windows startup. Information-age.com published this, June 12, 2014.

O'Reilly describes the discovery as suggestive of old tactics at times being the best, while as well makes the query if it's acknowledging respect to those 90s' malware authors who caused chaos alternatively whether they've re-emerged after retiring for a time-period towards creating one fresh state-sponsored arsenal of cyber-weapons.

The Mask, by utilizing a "bootkit" for infecting an OS prior to its loading, makes it one extremely potent weapon, nevertheless, in Context's opinion, the security community has overlooked the particular assault method.

Aside those abilities mentioned, The Mask can even read keystrokes, tamper with wireless operations, and tap into Skype calls, while enable hackers in seizing encryption keys too.

According to the researcher, since the malware's discovery, anti-malware agencies have enhanced their software programs to detect Careto so it now ceases to be any real threat. Cbronline.com published this, June 12, 2014.

O'Reilly says, the medium of the erstwhile assault included spear phishing e-mails having malware-laced attachments; however, it doesn't seem like it's yet occurring utilizing the mentioned toolset.

He points to the ambiguity if it's a trend that has ended or something to be vigilant about.

» SPAMfighter News - 6/21/2014

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page