1/6/2024 0 Comments Cisco ccie lab schedulerThis means that all bots are using a consistent time reference. Virus writers are starting to instruct their bot armies to coordinate their time keeping by accessing Internet based time servers. Using DDoS for extortion provides criminals with a remote control method of raising capital. In other words you would see concentrations of the virus in metropolitan areas and along key meeting places like cyber cafes or hotspots.ĭDoS attacks are seen as continuing threat because of the involvement of criminals in the malicious hacker/cracker world. This could be the USB memory key from home, files accessed on a compromised server or the web browser accessing a website.Īn interesting observation from the McAfee researcher was that this would mean a virus/worm distribution starting to follow a more biological distribution. This reinforces the concept that the network perimeter is no longer based on the Internet/Corporate LAN perimeter and instead it now sits wherever interaction between the host machine and foreign material exists. You can draw up any number of implications from this but my personal observation is that this means you have to consider the wireless attack vector as seriously as the fixed wire attack vector. So what happens if a virus or worm were able to infect a desktop via any common method and that desktop was part of a wired and wireless network? Instead of just searching the fixed wire LAN for targets, the virus/worm looks for wireless networks that are of sufficient strength to allow it to jump into that network. McAfee's research showed a security risk with wireless network deployment which is discussed in the Security Trends section of this document. This visit is the basis for the information in this document and is split into 4 parts:īrowsing looks set to become a bigger method of infection by a virus in the near future but there was also concern about the potential for a ‘media independent propagation by a virus', that I found very interesting.īy media independent I mean that the virus is not constrained to travelling over any specific media like Ethernet or via other physical infrastructure installations. As you are probably aware McAfee is an anti-virus (AV) vendor and AVERT ( Anti-Virus Emergency Response Team) is McAfee's AV research lab. In December 2004 I was invited to a one day workshop at McAfee's offices and AVERT lab at Aylesbury in England. Italics indicate a personal observation or comment. He refers to malicious activity as a term to cover the range of activity that includes worms, viruses, backdoors, Trojans, and exploits. This article written by Campbell Taylor - 'Global', is a review of the information learnt from a one day visit to McAfee and includes personal observations or further information that he felt were useful to the overall article.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |