contents

software
 
60% Rise in Malicious Code with Rootkit Features in 2006

PandaLabs has detected an alarming increase in the amount of malicious code using rootkit techniques. In 2006 there was a 62 percent annual increase and the forecast for 2007 is equally pessimistic. Given that in the first two months of the year the laboratory has already detected almost 25 percent of last year's total, the overall increase this year is expected to be around 40 percent.

Rootkits are programs that use stealth techniques to prevent malicious code from being detected by security and system administration software. As it is hidden, the malicious code can then act with complete impunity. Rootkits can also hide processes, files and even modifications to the Windows registry.

February's ranking of the most dangerous threats includes three malicious codes that use these techniques: Bagle.HX, Abwiz.A and the highly dangerous Nurech.A.

"Rootkit techniques are becoming increasingly popular among malware creators, particularly for spyware and banker Trojans", says Luis Corrons, Technical Director of PandaLabs.

As rootkits can evade detection by traditional security systems, proactive protection is needed to identify the program's behavior and detect malicious code using these techniques.

"Users need security systems that can counter this type of hidden threat, otherwise their confidential data can be exposed with the consequent risk of theft and fraud", explains Corrons.

Panda Software's TruPrevent Technologies are a powerful weapon in the fight against hidden threats. These proactive technologies analyze program behavior to sniff out hidden malicious code such as rootkits or those that have yet to be identified by antivirus laboratories. TruPrevent Technologies provide the additional cover needed to protect against unknown threats and intruders and are fully compatible with the reactive technologies used by antivirus solutions.

Panda Software also offers two new tools for detecting the latest generation malware: Malware Radar and NanoScan. Using the "anti-malware collective intelligence" approach developed by Panda Research, they can detect much more malware than any other tools currently available and are continually updated. Unlike traditional antiviruses, they don't need to install a virus signature file on the computer, as they have online access to Panda Software's malware knowledge base hosted in a network of Data Centers.

Malware Radar is essentially a corporate tool, while NanoScan, now available in beta version, is aimed at the consumer market and detects all active malware in critical areas of computers in less than 60 seconds.



write your comments about the article :: © 2007 Computing News :: home page