Spyware Use Detection-Resistant Technology To Attack Computers
Malwares equipped with stealth technology are creating a stir in South Korea. Spyware with such detection-resistant technology, called rootkits, have spread prolifically oblivious to cybernauts as they are undetectable, as stated by the anti-virus vaccine creator AhnLap, in April 6, 2007's issue of Times.
The PandaLabs software squad in 2006 had observed a 62 percent growth in the number of malwares using rootkit technology. The rootkit number is on course and is projected to increase further in 2007. Supported by its latest discovery rates, the PandaLabs estimates a 40 percent rise above the 2006 data. PandaLabs averred that in January and February 2007, it had covered about 25 percent of the total discoveries made in 2006, as indicated by Windowsitpro in its April 8, 2007 issue.
"Malevolent programs slip into laptops and PCs aided by rootkits, without the users knowing of the affliction," reported Kang Eun-sung, Seoul-stationed AhnLab's senior researcher, in Times' April 6, 2007 issue.
Rootkits normally penetrate the organization either using freeware downloads (the rootkit is stealthily packed within a new "freeware") or by tapping an program susceptibility through browsers, IM and VoIP clients or via e-mails.
"Specially, spyware has grown in volume recently, creating problems under the cover of rootkits. People should be vigilant that the spyware adopting rootkits could carry confidential information from contaminated PCs to the culprits", cautioned Kang.
"Users should update their anti-virus vaccines and OS to the current ones and avoid visiting dubious sites", Kang appended in a report released by Times on April 6, 2007.
PandaLabs' technical director, Luis Corrons alleged, "Rootkit approaches are getting progressively more recognized among malware architects, specially for spyware and lucrative Trojans", as indicated by Windowsitpro's April 8, 2007 edition.
Unaccompanied, rootkits aren't harmful. Initially, they were meant for beneficial applications but malware authors, attempting unauthorized access into computers sneakily, have exploited them progressively. However the technology can be exploited by malware to conceal itself to elude discovery. The stealth cover offered by rootkits, assists spyware to function unnoticed. The hacker can later remotely position or change parts, rob stored private data and also misuse the exposed computer for criminal actions.
Related article: Spyware Detection Programs Track Advertisers’ Cookies
» SPAMfighter News - 16-04-2007