Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Apple
    • Apple
    • Applications
    • Cybersecurity
    • Servers

    Rootkits, Smarter Hackers Pose Growing Security Threats

    Written by

    Matt Hines
    Published April 17, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      If reports issued by several well-known anti-virus companies are on the money, IT administrators will continue to face new and sophisticated forms of malware that challenge the security industrys ability to stay ahead of emerging threats.

      Based on a new study released by software maker McAfees Avert Labs group, the technology used to cloak many different forms of malware, especially rootkits, is becoming increasingly complex and harder to detect.

      Factoring into the issue, and the continued maturation of malicious attacks on enterprise systems, is the growing tendency toward collaboration among hackers, according to the report.

      McAfee said its research indicates that the use of so-called “stealth technologies” has jumped by over 600 percent during the last three years.

      The number of rootkit attacks being reported to McAfees labs was up by 700 percent during the first quarter of 2006, compared with the same period in 2005.

      /zimages/5/28571.gifClick here to read why Microsoft says recovering from malware is becoming impossible.

      A rootkit is used to modify the flow of a software programs kernel to hide the presence of an attack on a machine. It gives a hacker remote user access to the compromised system while avoiding detection from anti-virus scanners.

      “The growth has been extraordinary and the use of rootkits that we are seeing is far more complex than any examples weve seen in previous years; the stealth aspect of these attacks is making them very hard to find,” said Stuart McClure, senior vice president of global threats at McAfee, in Santa Clara, Calif.

      “These technologies are so deeply embedded that even if you are able to remove them, you often destabilize a system quickly, and cleaning these things out remains enormously challenging,” McClure said.

      Another aspect of the growing problem is that rootkits are increasingly being written to attack systems running on Microsofts Windows operating system. While rootkits previously troubled more Linux and Unix-based systems, McAfee said Windows-oriented rootkits increased by a staggering 2,300 percent between 2001 and 2005.

      According to the research, that trend is spurred by both the desire to break into Microsofts proprietary software, and the fact that a larger number of machines run Windows, meaning more are available for attack.

      McAfee contends that one of the primary drivers of the expanded proliferation and complexity of rootkits is growing collaboration among virus writers, including the misuse of materials published on resource Web sites dedicated to helping people fight the programs. Since some of these sites, such as Rootkit.com, contain hundreds of lines of rootkit code, and may be doing more harm than good, McClure said.

      “The threats are constantly evolving; someone figures something out and within minutes its being distributed. The malware writers are getting much smarter and faster at sharing information and realizing the profit in this,” he said. “Rootkit.com and the others come off as wanting to educate the industry, but the problem is that posts on those Web sites are dropped directly into malware. These good guys are trying to regulate the information, but, unfortunately, its being misused.”

      /zimages/5/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Jamie Butler, an administrator and malware code contributor to Rootkit.com since 2001, said people seeking the types of information available on the site could easily find it elsewhere. The people publishing malware code on Rootkit.com have often been familiar for years with the types of attacks being described there, he said.

      He added that Rootkit.com doesnt have plans to stop publishing code on the site.

      “Dissemination of information is always useful in the long run, and these tactics have been around and were well-known underground,” Butler said. “If anything, part of the problem remains that the people responsible for protecting against these types of attacks dont have access to the closed-door algorithms of the big vendors; those companies read the site, but they dont contribute anything.”

      In a separate research report, anti-virus software maker Kaspersky Lab identified a handful of evolving threats that it said could serve to trouble IT administrators in the future.

      Kaspersky, based in Woburn, Mass., said it identified specific three proof-of-concept attacks being tested out by hackers, at least one of which could pose a challenging risk to network defenders.

      The program reportedly locates itself in a computers boot sector and gains control of the device prior to the launch of its operating system. Because the attack is introduced in this manner, Kaspersky said, the program is able to modify many operating system functions.

      While most anti-virus applications scan a computers boot sector, the security company warned that it still be “extremely difficult” to detect any interception or substitution of system functions by the program.

      Another trend highlighted in the research was the growing popularity of malicious programs being created specifically to attack Apple Computers Mac operating system.

      Although Apples operating system software previously hasnt been targeted as aggressively by code writers as its rivals, Kaspersky said the emergence of the so-called Leap virus in February, and the isolation of the Inqtana worm soon thereafter, show that there is increasing interest among malware writers in attacking Apples products.

      /zimages/5/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×