New Virus Count Nearly Triples - InformationWeek
IoT
IoT
News
News
4/26/2005
06:24 PM
50%
50%

New Virus Count Nearly Triples

Creators of malicious code are trying to exploit the belief that daily updates are sufficient for keeping a computer protected from new viruses by releasing waves of variants of a single virus.

The number of new viruses has almost tripled in the last six months, an anti-virus vendor said Tuesday, the spike fed by hackers releasing scads of variants to overwhelm defenses.

According to Panda Software, which is headquartered in Spain but has U.S. offices in Glendale, Calif., the count of new viruses has increased 278 percent since the third quarter of 2004.

"Until now, daily updates were considered sufficient for keeping a computer protected from new viruses, and it is exactly this belief that the creators of malicious code are now looking to exploit," said Luis Corrons, the director of Panda's research lab, in a statement. "If they can launch many variants, those that appear after the user has incorporated the new vaccines to their anti-malware solution will have no less than 24 hours to infiltrate the system before the following update."

The trend is a continuation of one seen in early 2004, when the writers of Bagle, MyDoom, and Netsky engaged in a back-and-forth battle, sometimes releasing multiple versions in a single day.

Panda pegged the prolific Mytob worm, which first appeared in February, as the leader in the more-is-better strategy, with 74 variants at last count. Other examples that Panda highlighted were the Kelvir worm (25 version) and Bropia (36). Even older worms are in the action, added Panda: since January 2005, 35 Bagle and 32 MyDoom variants have appeared.

Although Panda, and some other anti-virus firms, roll out new definition files more frequently than daily, Corrons recommended combining "reactive" software such as anti-virus programs with proactive detection technologies capable of detecting malware without having prior knowledge of the threat. Such intrusion detection systems (IDS) typically watch for behaviors that shout "malicious code," rather than compare a potential virus to a signature.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
2017 State of IT Report
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends for 2018
As we enter a new year of technology planning, find out about the hot technologies organizations are using to advance their businesses and where the experts say IT is heading.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll