
The concept is great, excluding the dark web(closed behind authentication, and basic crawler blocking approaches), but what bothers me besides all the fuss is that it's a signature based approach taking advantage of the most recent Google's crawl of the Web. 0day malware naturally remains undetected, while it's a great way to sum up the percentage of infections with known malware on different domains/hosts, given you know what and where to look for. It's not the binary nature of a malware to emphasize on, but today's malware released under a GPL license, an issue I stated as a key factor for the future growth of malware at the beginning of 2006. I also came across to an article pointing out the same problem :

To keep the discussion going by the time I release a summary of what I've been coming across for quite a while -- tons of bot source codes available on the public Web, barely any binaries -- go through previous posts related to the diverse topic as well.
UPDATE : eWeek has a nice article on the topic
Malware
Malware trends - Q1, 2006
What are botnet herds up to?
Why relying on virus signatures simply doesn't work anymore?
Skype to control botnets?!
The War against botnets and DDoS attacks
Master of the Infected Puppets
One bite only, at least so far!
Look who's gonna cash for evaluating the maliciousness of the Web
The anti virus industry's panacea - a virus recovery button
No Anti Virus Software, No E-banking For You
The Current State of Web Application Worms
Web Application Email Harvesting Worm
Unknowingly Becoming a Child Porn King
Real-Time PC Zombie Statistics
Malicious Web Crawling
Agobot configuration interface courtesy of Hakin9's "Robot Wars – How Botnets Work".
No comments:
Post a Comment