180 likes | 290 Vues
This overview examines the evolution of malware from the early days of non-replicating viruses to today's increasingly sophisticated threats. It highlights the shifting motivations from vandalism and "glory" among hackers to monetary gains through theft and control. Various network platforms such as Usenet, IRC, and P2P have played pivotal roles in the propagation of malware over the years. Additionally, we review the top malware detections across these networks, illustrating the changing landscape of cybersecurity challenges and the continuous pursuit of malicious actors to exploit vulnerabilities.
E N D
Malware in Popular Networks Dmitry O. Gryaznov
Mostly viruses, few trojans Obvious destructive or annoying payload Mischief and vandalism Nothing gained but “glory” Mostly non-replicating malware Trying to stay inconspicuous Theft and control Monetary gains The Big Change Then Now
Malware “Highways” • E-mail • Usenet • Internet Relay Chat (IRC) • Peer-to-peer (P2P) • Instant Messaging (IM)
Usenet • Since early 1980s • Over 100,000 newsgroups • Millions of users • Over 2 Terabytes daily • Mostly binaries – video, audio, software
Internet Relay Chat (IRC) • Since early 1990s • Dozens of networks (EFNet, DALnet, Undernet, etc.) • Millions of users • Direct file spamming (via DCC Send) • URL spamming (via text messages) • Used by numerous malwares even when no IRC software was ever installed by user
Peer-to-peer networks (P2P) • File sharing: movies, music, software • Numerous networks (Kazaa, eDonkey, BitTorrent, Gnutella, etc.) • Millions of users • “Bridging” between different networks