Skip to main content

New threat from 'suicide' virus | Tech News on ZDNet

ZD Net reports from Australia:

"According to Denehy, techniques used not only include 'the obvious ones' such as encryption and rootkits but also 'compression bombs'--which are compressed files that try to make life difficult for forensic tools by attempting to expand to an infinite size when executed."

This is a new twist on a strategy that has really not been exploited fully by hackers, that of impersonation of legitimate applications. Anti-virus tools use checksums at differnet locations in a file to assess the legitimacy of a file against known results from verified software. If this procedure is known then hackers can get their malicious software to look, feel and act like legitimate software.
Real Time Web Analytics