Virus authors 'pack' malware to avoid detection

A variety of malware threats, rather than one specific virus, dominated the security landscape this February, according to security firm BitDefender. However, the company said that all the threats in its Top 10 Malware List for February used the same packing method to obfuscate the payload.

"Virus writers use packers to decrease the size of the virus and to increase the cost of analysis," said Sorin Dudea, head of BitDefender AV Research. "Unpacking something packed in an as-yet unknown manner takes a lot of time and skill." Malware using this single packing method accounted for 37.02 per cent of all detections in February.

View: The full story @ vnunet

Report a problem with article
Previous Story

Mobo maker builds 'powerless' processor cooling fan

Next Story

Kingston Achieves Unprecedented Memory Speeds with DDR3


Commenting is disabled on this article.


From reading the article, it appears that the reported thought it novel that malware was obfuscated with a runtime-packer, which is not the case. Back in the early 1990s, it was not that unusual to see technologies such as PKWare's P program to pack droppers and then executables as part of the infection process in order to make them more difficult to scan for malware.


Aryeh Goretsky

AKA "We're not going to make as much money as we expected this quarter so we better prepare our excuses so we can point at them in a month or so."


Is is really necessary to post news articles like this?

This is not really news, it's well known information and the article does not offer anything interesting to the subject.



You know, after the last 20 years or so of nigh infinite self-serving AV articles wherein the packing methods of malware to avoid detection have been expounded upon ad nauseum, this is the FIRST PR puff piece article prepared purely for the benefit of the AV company's stockholders that really brought this non-issue home to me. 8P