Opinion

The end of the Age of Worms?

After Sobig.f and Mydoom.a, after the infamous cyber-war between Mydoom, Bagle and Netsky authors, I thought the situation would only get worse. But now it’s the end of October and we haven’t seen a serious email worm outbreak for months.

When I sit down and think of why this year is so different from previous years, I see several factors that help break the pattern:

Firstly, virus writers have been arrested worldwide, and there has been lots of media coverage. The computer underground sees that cyber criminals are going to be caught, no matter where they hide.

Secondly, we have improved our generic and heuristic detection because of the virus outbreaks over the past year. We are also detecting and blocking possible epidemics better and faster.

Thirdly, I think maybe users are beginning to be less careless about opening emails and clicking on attachments and/or enclosed links.

A few other ideas come to my mind, but they concern recent events in the computer underground and I’ll leave that for next time…

{to be continued}

The end of the Age of Worms?

Your email address will not be published. Required fields are marked *

 

Reports

The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox