Research team creates undetectable malware bound to legitimate software downloads

By Justin Kahn
Aug 21, 2014
Post New Reply
  1. Most cyber attacks from your typical home hacker, come by way of techniques used 10 years ago or more like phishing scams, poor password management, and things of that nature. But now it seems as though a research team from...

    Read more
  2. captaincranky

    captaincranky TechSpot Addict Posts: 11,467   +1,760

    It's stories like this that make you ask yourself, "is having internet really worth the aggravation"....:confused:
    cliffordcooley likes this.
  3. dividebyzero

    dividebyzero trainee n00b Posts: 4,891   +1,258

    Presumably the internal discussion ended with the realization you had no viable Plan B for having Russian art models come visit? :eek:
  4. captaincranky

    captaincranky TechSpot Addict Posts: 11,467   +1,760

    Well, "Plan B", is an old XP box, with no stored passwords, no passwords ever entered, and presumably no active or executable content downloaded.

    I'm a simple man, with simple needs. My quest for free programs ended back at DVDFab 8... point something.
  5. tonylukac

    tonylukac TS Evangelist Posts: 1,292   +55

    They've had this for 20 years. Why would say they have tested malware free downloads?
  6. psycros

    psycros TS Evangelist Posts: 1,298   +667

    "The researchers explain, "upon starting the infected application the binder is started."

    From the sound of it there's nothing new about this at all. Its just a man-in-the-middle attack that infects a redirector applet. Externally streamed pop-up malware has been doing that since forever.
  7. captaincranky

    captaincranky TechSpot Addict Posts: 11,467   +1,760

    Because you wouldn't download anything from them if they told you it did have malware in it.

    And BTW "Open Candy" isn't is it...?:confused:
  8. RzmmDX

    RzmmDX TS Addict Posts: 295   +58

    Wouldn't a crc check fix this problem...
  9. VitalyT

    VitalyT Russ-Puss Posts: 3,114   +1,379

    A good-intended research, I'd wager...
  10. SalaSSin

    SalaSSin TS Booster Posts: 135   +42

    Does anyone still remember the "silk thread", wasn't that a similar way used back in 2000 to bind viruses to legitimate files?
  11. Back in 1989 there was the 4096 virus. All .exe and .com files where 4096 bytes bigger when viewed on a clean system. On the infected system, the files listed with the same size & passed CRC integrity checks.
    That's why it was a Stealth virus...

Similar Topics

Add New Comment

You need to be a member to leave a comment. Join thousands of tech enthusiasts and participate.
TechSpot Account You may also...