[LINK] Web malware a 'loosing battle'
stephen at melbpc.org.au
stephen at melbpc.org.au
Tue Dec 18 13:01:20 AEDT 2007
Malware flood driving new AV
Symantec researchers say number of malicious applications is rapidly
outpacing the volume of legitimate programs, forcing a rethink of AV
defense tactics By Matt Hines. December 14, 2007
http://www.infoworld.com:80/article/07/12/14/Malware-flood-driving-new-
AV_1.html?source=NLC-TB&cgd=2007-12-17
During a weeklong period in mid-November, security experts with Symantec
observed roughly 65,000 new applications being downloaded onto the
computers of customers participating in a new research project -- based on
their analysis of the software, as many as 60 percent of the programs were
malicious.
The numbers point to a disturbing trend that the researchers say may force
the security company to change its fundamental approach for warding off
threats -- that being that the number of malicious applications coming to
life on the Web appears to be outpacing the volume of legitimate programs.
With malware authors using fuzzing tools to find holes in popular
applications such as Web browsers, and testing their work against
commercial anti-virus (AV) products to ensure that the attacks evade
detection by the tools, leading researchers at Symantec admit that
defending against threats using traditional methods has become something
of a losing battle.
"The reality is that most new malware is going undetected by commercial
security products, and not just Symantec's, but we have to recognize that
like all other AV products we are probably missing a sizeable amount of
this malware," said Carey Nachenberg, a member of the company's Symantec
Research Labs who also wears the title of Symantec Fellow.
The trend toward malware authors using small runs of attacks to evade
detection and hook as many victims as possible, known as server-side
polymorphism, is forcing Symantec to reassess how it goes about protecting
its users.
Since it can't hope to keep up with every flavor of threat that is being
created, traditional countermeasures such as the use of malware signatures
or behavioral heuristics will need to be augmented with new tactics,
Nachenberg said.
One such alternative is the use of the same distributed data collection
capabilities that Symantec is using to track the proliferation of malware.
By creating a system of file and Web site reputation by studying
applications usage patterns among its customers, the researcher said,
Symantec hopes to use a community approach to help people determine which
programs they decide to use, or avoid.
--
--
Message sent using MelbPC WebMail Server
More information about the Link
mailing list