News

Brief History: Malware now and then

Today's malware samples are increasingly unique and complex, with some invasions having the ability to affect a number of endpoints in ways that were previously thought impossible.

Today's malware: ATM thefts, jumping air gaps
For example, many thought that ATM systems were impervious to malware attacks as banks have strong security protocols to protect the large sums of cash being kept inside these machines. However, BGR contributor Chris Smith recently reported that cyberattackers were able to infiltrate these mechanisms with malware allowing them to steal large value bank notes.

During the investigation which began after the first attack was discovered in July 2013, experts found that criminals were able to cut holes in the ATMs to input the malware samples from a USB. Once this step was complete, the holes were patched and the individual could complete a two-step authentication process to steal money.

Another surprising malware sample has developed to not need a physical network to spread. According to Ars Technica, computer scientists recently created a malware prototype that can utilize inaudible audio signals to communicate. This provides it with the capability to transmit keystrokes and other sensitive information back to malware authors even when the device is not connected to the network.

These malware samples illustrated the developing abilities that today's infections can have; however, it is important to note how technology evolved over time to allow these infiltrators to be created.

Yesterday's malware: A series of firsts 
According to Baseline Magazine, one of the earliest recorded activities that could be considered malware came in 1962 when Bell Telephone Labs researchers created a game with the ability to destroy software programs. This represents the forerunner of most destructive samples.

The first virus appeared in 1971, dubbed the Creeper Virus. The sample affected the ARPANET platform, a network existing before the Internet. The virus was able to replicate itself and users were notified of the infiltration when they received a notice that read "I'm the Creeper: Catch Me if You Can."

In 1981, Apple II users saw one of the first widespread platform infections in the form of Elk Cloner, which infected endpoints through floppy disks, stated Baseline Magazine. This malware sample generated messages displayed on individuals' systems and impaired the performance of infected machines until they were rendered unusable.

Business and consumers were likely first made aware of the need for heightened security in 1986, when the Brain virus appeared. This sample was the first global epidemic and showed how much more knowledgeable cybercriminals of the day were than consumers and business users.

The Vienna virus first appeared in 1987, and was reportedly the first sample to destroy data. However, this infection also paved the way for the first antivirus software. According to Baseline Magazine, later that year, one of Vienna's authors established an application to counteract the malware.

A main innovation in malware creation came in 1990, when the first polymorphic sample was recorded. Dubbed Chameleon, this was the initial malware with the ability to adjust itself to avoid detection.

Whether it is a new or old malware infection, one ideal way in end users can protect their data from such threats is through encryption.

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +353 1 793 9141
Fax: +27 21 819 2950

Buy now! Try now!