Virtual malware

What is it?

 

 

 

Worms have become increasingly aware of the virtual environment. Security researchers have long used "honeypots" to conduct research on malware. Virtualization is used to provide a controlled and easily replicable honeypot platform.

How does it work?

Malware developers have learned how to detect when their code is running in a virtualized environment and then hide themselves. The malware can identify its hosting platform as virtualized by looking for certain virtualized hardware devices identifying BIOS characteristics typical of VMs.

Should I be worried?

Currently, the known examples of virtualization-aware malware only use the platform knowledge to hide. But, the next step is to exploit the virtual infrastructure to propagate the malware.

How can I prevent it?

Virtual firewalls are essential to protecting the virtual environment by reducing the risk of initial infection and thwarting the ability of malware to propagate across virtual machines. Apply the same OS security best practices to guest VMs as are used for physical machines. This may include anti-virus software, patch management and system hardening.

close

Next Article in News

Sign up to our newsletters

More in News

Bitcoin mining botnet has become one of the most prevalent cyber threats

Fortinet researchers have tracked 100,000 new ZeroAccess trojan infections per week, making the botnet very lucrative to its owners.

House Intelligence Committee OKs amended version of controversial CISPA

House Intelligence Committee OKs amended version of controversial ...

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

Judge rules hospital can ask ISP for help ...

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.