Past, present, and future Malware
Table of Contents
This article is about Malwares. It covers their past, present, and future. I hope you enjoy it…
Before we get into the details of how to deal with malware history, past and present, we need to first define the terms, cover common types, and then introduce the basic approaches to malware analysis to highlight and identify the article.
Malware (or malicious software) is any program that is intentionally designed to perform an illegal, often dangerous, action. It is a general term for software that has malicious intents. It covers many categories such as virus and spyware, rootkits Trojan horses, backdoors, bots, and so on. (Automatic Malware Analysis Springer P.23] Malwares have been a major threat since the early days of computing. Many studies show that malware can cause billions of dollars in financial losses each year. Malware writers are no longer hobbyists or activists and are now profit-driven so the future of stopping it is not very bright. (Eugene Kaspersky, AusCERT 2012 Keynote speech)
Types of Malware:
I’m sure that you all know what Trojan means. means. We all know how victims can be infected.
To predict the future of viruses, we must look back at the past to try to understand how they were created. This requires that we know a Malware stage:
Based on Baseline Magazine, in 1962 Bell Telephone Lab’s researchers create a game that kills software programs. All began with a game J In 1971, the “real” virus appeared on ARPANET. The virus was a replication of itself with the message “I’m creeper: Catch me if I can”. In 1981, Apple 2 platform was the site of the first widespread outbreak. Eric Cloner spreads the virus using a floppy disk. The virus was infecting boot sectors, generating messages that were impairing performance.
Finally, in 1983, Professor Len Adleman from Lehigh University demonstrated the virus concept in an seminar. The term “computer virus” became a part of our daily lives.
1986 was the year the world discovered that computer viruses were not being cured by consumers. The “Brain Virus”  was already hitting the PC platform.
1987 was the year that the Vienna virus  spread worldwide and destroyed data. IBM released their first antivirus, “Viruscan for MS-DOS”, right after the outbreak.
1991 Many Anti-Virus companies were on the market with “300” viruses, that is to say 300.
1996 viruses began to attack Microsoft platform, Laroux and then Win32. HLLP.DeTrio began to steal passwords.
2001 was the year that e-mails became the primary transmission channel. Malwares spread via e mails and internet more frequently.
2007 was the first year that Botnets infected millions upon millions of systems around the world. DoS attacks began to affect Computer users.
As I mentioned in my intro today, the impact of viruses can be measured in billions of dollars.
To combat malware development and innovation, we first need to understand the “enemy”. They are becoming more complex and this is not an easy task. It is important that we can analyse malicious binary programs to detect their malicious behaviours. There are many ways to gather information about suspicious programs, including honeypots, computer analysis of compromised systems, and underground channels. Analyzing this unknown program reveals its malicious behaviours, and we can then extract attack mechanisms. We can then use the analysis results to create detection signatures and update detection policies. To keep up with the rapid pace of malware development, this analysis must be automated. GFI Sandbox (Secunia CSI) is my favorite tool.
Past, present, and future Malware