Opinion

Virus writers fear no retribution

We’ve been continuing to investigate the Bagle situation – and it shows us once again how helpless legislation is in the face of cyber crime. At the moment, cyber-crime laws are local, and are specific to individual countries. But virus writers aren’t constrained by national boundaries.

So what has this got to do with Bagle? It’s become clear to us that the authors of Bagle, Netsky, Zafi and a whole range of other malicious programs are working closely together. They may not know each other personally, but they’re all using information from the author of Bagle to send out their creations. In just the past two days, over 50 modifications of worms and other malicious programs have been widely distributed by these virus authors. And the timing of the mailings shows that the malicious code is being sent either automatically or semi-automatically.

So virus writers have not only joined forces, but they’ve automated the process of infecting computers and finding new victim machines. They understand that legislation is powerless to stop them, and are continuing to extend their reach. This latest case is another nail in the coffin of a safe, user-friendly Internet.

Virus writers fear no retribution

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Reports

Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs

Kaspersky GReAT experts dive deep into the BlueNoroff APT’s GhostCall and GhostHire campaigns. Extensive research detailing multiple malware chains targeting macOS, including a stealer suite, fake Zoom and Microsoft Teams clients and ChatGPT-enhanced images.

Mem3nt0 mori – The Hacking Team is back!

Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.

Mysterious Elephant: a growing threat

Kaspersky GReAT experts describe the latest Mysterious Elephant APT activity. The threat actor exfiltrates data related to WhatsApp and employs tools such as BabShell and MemLoader HidenDesk.