Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

New Rootkits Increased during Q1-2014, finds McAfee

McAfee the security vendor, which has just released its "Quarterly Threat Report," declares statistics in it which indicate that fresh rootkit samples after representing a declining condition over 2012-13 has progressively increased during Q1-2014 at an unprecedented level observed from 2011.

The reason attributed to this unanticipated hike in rootkit contaminations between January and March 2014 is primarily one particular family of rootkits, which attacked Windows computers of 32-bit type. Nevertheless, it is expected that fresh rootkits targeting systems of 64-bit type will result in an increase of the kind of assault in question during the coming days, state McAfee researchers within their report, according to pcworld.com publication dated June 27, 2014.

It may be noted that rootkits are malicious software that conceal other malevolent programs or operations from the infected end-users. By running within a computer's operating system kernel after gaining system privileges to the maximum possible level, they make it more difficult for security solutions to detect and remove this malware.

McAfee researchers express with confidence that during the last two years, fresh rootkit samples declined because there was an increasing adoption of Windows PCs characteristic with the 64-bit version that encourage such threats by enabling certain defenses.

Moreover, the report mentions Uroburos, the latest advanced rootkit, which possibly is the creation of the Russian intelligence unit that remained unnoticed for 3-yrs. This malware works by invading huge networks utilizing P2P infrastructure for infecting as well as seizing data from computers that mayn't even have a direct connection with the Internet. Usually, there are most secret databases on such computers.

In nutshell therefore, rootkits are perilous due to the stealth they employ for contaminating, staying concealed and seizing data from the targeted PCs over a long period. This longtime presence increases the possibilities for attackers to destroy else grab consumer or corporate data.

Sadly, according to McAfee, the hurdles that 64-bit computers put in place currently seem as merely temporary blockades for highly systemized cyber criminals since these attackers now know how to target the kernel for acquiring admission. Infosecurity-magazine.com published this in news on June 26, 2014.

» SPAMfighter News - 03-07-2014

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next