Feeds

The strange decline of computer worms

Bots, IM and email attacks in the new world of malware

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Computer worms are becoming less commonplace as virus writers diversify their malware spreading tactics to create the maximum effect for the least possible effort. Email-borne worms, such as NetSky, Bagle and Sober, remain perennial favourites with malware authors but Slammer-style worms are becoming rarer, according to anti-virus firm F-Secure.

Mikko Hyppönen, director of anti-virus research at F-Secure, said that with the single exception of the Santy worm (which targeted vulnerable PHP installations) little new has been seen of computer worms since the May 2004 outbreak of Sasser. The hiatus follows a string of high-profile worm outbreaks including Blaster, Nimda, Slammer, Welchi and Code Red over recent years. The decrease in computer worms noted by F-Secure ironically comes at the same time many vendors, such as HP, Cisco, Check Point and others, are aggressively marketing worm-throttling technology.

One explanation for the dip in computer worms is that the widespread use of XP SP2 and greater use of personal firewall had rendered worms far less potent in the same way that boot sector viruses died out with Windows 95 and the introduction of Office 2000 made macro viruses far less common. Thwarted worm attacks could be explained by security improvements but Hyppönen notes that virus writers have not even attempted to spread computer worms over recent months. Computer worms exploit software vulnerabilities to spread automatically and are technically more difficult to write than other types of malware. Hyppönen reckons this factor might have a lot to do with explaining their relative decline.

Whilst standard computer worms have experienced a relative decline, email worms have remained a problem and instant message security threats are becoming a greater concern. "A worm that exploited an IM vulnerability to spread could spread very quickly and travel straight through firewalls," Hyppönen warned. Spyware, Trojans and other types of software that turn PCs into zombie drones in botnets, and the increased sophistication of viruses capable of infecting mobile phones also remain key security concerns. F-Secure recently released a free toolkit designed to root out 'stealth' software that can hide malicious programs from conventional anti-virus and anti-spyware packages, a tactic adopted in the Invisible Keylogging spyware package and viruses such as Maslan and Padodor that F-Secure expects will become increasingly common over time.

Hyppönen made his comments during the Websec 2005 Conference in London on Thursday 17 March. ®

Related stories

MMS virus discovered
Santy worm defaces thousands of sites
Windows worms tax ISPs
Sasser worm creates havoc
Blaster rewrites Windows worm rules

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.