Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Who creates viruses?


  • Please log in to reply
18 replies to this topic

#1 Betrayal

Betrayal

  • Members
  • 18 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:06:35 AM

Posted 12 November 2011 - 04:42 PM

Who creates viruses such as AV Security Suite 2012? o.O

BC AdBot (Login to Remove)

 


#2 Andrew

Andrew

    Bleepin' Night Watchman


  • Moderator
  • 8,257 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Right behind you
  • Local time:04:35 AM

Posted 12 November 2011 - 07:38 PM

Most modern malware is created by or for criminal syndicates who make money from infecting large numbers of computers. Examples like AV Security Suite make their money by tricking victims into buying the "full version" of the software. Other common ways of making money with malware include stealing information such as bank account, e-commerce, and other credentials and the creation of botnets which the bot herder can then rent out to other criminals. Still other groups write malware kits which they sell to other criminals. Malware kits allow less-technical criminals to create new variants of malware for their own use.

More rare, but likely to become more common, are so-called "State-Sponsored Malware" which are malicious programs (likely) written and controlled by a government agency. An example of (probably) state-sponsored malware would be the Stuxnet worm, which has been described as "weaponized" malware.

#3 the_patriot11

the_patriot11

    High Tech Redneck


  • BC Advisor
  • 6,755 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Wyoming USA
  • Local time:04:35 AM

Posted 12 November 2011 - 08:33 PM

Of course, theres also just those nerds at home with nothing better to do with their time.

picard5.jpg

 

Primary system: Motherboard: ASUS M4A89GTD PRO/USB3, Processor: AMD Phenom II x4 945, Memory: 16 gigs of Patriot G2 DDR3 1600, Video: AMD Sapphire Nitro R9 380, Storage: 1 WD 500 gig HD, 1 Hitachi 500 gig HD, and Power supply: Coolermaster 750 watt, OS: Windows 10 64 bit. 

Media Center: Motherboard: Gigabyte mp61p-S3, Processor: AMD Athlon 64 x2 6000+, Memory: 6 gigs Patriot DDR2 800, Video: Gigabyte GeForce GT730, Storage: 500 gig Hitachi, PSU: Seasonic M1211 620W full modular, OS: Windows 10.

If I don't reply within 24 hours of your reply, feel free to send me a pm.


#4 Andrew

Andrew

    Bleepin' Night Watchman


  • Moderator
  • 8,257 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Right behind you
  • Local time:04:35 AM

Posted 12 November 2011 - 11:08 PM

Of course, theres also just those nerds at home with nothing better to do with their time.

Hey, I've only ever written ONE thing that could be categorized as malware. <_<

#5 killerx525

killerx525

    Bleepin' Aussie


  • Members
  • 7,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Melbourne, Australia
  • Local time:10:35 PM

Posted 13 November 2011 - 12:49 AM


Of course, theres also just those nerds at home with nothing better to do with their time.

Hey, I've only ever written ONE thing that could be categorized as malware. <_<

But your malware does nothing but procrastinate :P

>Michael 
System1: CPU- Intel Core i7-5820K @ 4.4GHz, CPU Cooler- Noctua NH-D14, RAM- G.Skill Ripjaws 16GB Kit(4Gx4) DDR3 2133MHz, SSD/HDD- Samsung 850 EVO 250GB/Western Digital Caviar Black 1TB/Seagate Barracuada 3TB, GPU- 2x EVGA GTX980 Superclocked @1360/MHz1900MHz, Motherboard- Asus X99 Deluxe, Case- Custom Mac G5, PSU- EVGA P2-1000W, Soundcard- Realtek High Definition Audio, OS- Windows 10 Pro 64-Bit
Games: APB: Reloaded, Hours played: 3100+  System2: Late 2011 Macbook Pro 15inch   OFw63FY.png


#6 the_patriot11

the_patriot11

    High Tech Redneck


  • BC Advisor
  • 6,755 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Wyoming USA
  • Local time:04:35 AM

Posted 13 November 2011 - 10:26 PM

procrastinating malware. Now thats malware I could actually live with. . .

picard5.jpg

 

Primary system: Motherboard: ASUS M4A89GTD PRO/USB3, Processor: AMD Phenom II x4 945, Memory: 16 gigs of Patriot G2 DDR3 1600, Video: AMD Sapphire Nitro R9 380, Storage: 1 WD 500 gig HD, 1 Hitachi 500 gig HD, and Power supply: Coolermaster 750 watt, OS: Windows 10 64 bit. 

Media Center: Motherboard: Gigabyte mp61p-S3, Processor: AMD Athlon 64 x2 6000+, Memory: 6 gigs Patriot DDR2 800, Video: Gigabyte GeForce GT730, Storage: 500 gig Hitachi, PSU: Seasonic M1211 620W full modular, OS: Windows 10.

If I don't reply within 24 hours of your reply, feel free to send me a pm.


#7 killerx525

killerx525

    Bleepin' Aussie


  • Members
  • 7,220 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Melbourne, Australia
  • Local time:10:35 PM

Posted 14 November 2011 - 01:24 AM

:hysterical:

>Michael 
System1: CPU- Intel Core i7-5820K @ 4.4GHz, CPU Cooler- Noctua NH-D14, RAM- G.Skill Ripjaws 16GB Kit(4Gx4) DDR3 2133MHz, SSD/HDD- Samsung 850 EVO 250GB/Western Digital Caviar Black 1TB/Seagate Barracuada 3TB, GPU- 2x EVGA GTX980 Superclocked @1360/MHz1900MHz, Motherboard- Asus X99 Deluxe, Case- Custom Mac G5, PSU- EVGA P2-1000W, Soundcard- Realtek High Definition Audio, OS- Windows 10 Pro 64-Bit
Games: APB: Reloaded, Hours played: 3100+  System2: Late 2011 Macbook Pro 15inch   OFw63FY.png


#8 computerxpds

computerxpds

    Bleepin' Comp


  • Moderator
  • 4,483 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:USA
  • Local time:07:35 AM

Posted 16 November 2011 - 09:47 AM

Andrews malware:

Hmm I think I will steal his info now.. No maybe later I have to go shopping and take the dog out and feed a cat.
Next day:
Hmm should I... Wait that sounds hard nope not today maybe tomorrow.

Lol

There are generally two categories of malware writers

1. Those that do it to anger a user and have nothing to gain for it

2. Those who do it for personal gain and to make money by stealing others info.

3. I know I said two but then there are those that do it for research and testing.

Of those the 2nd is the most dangerous and annoying people. But that is why we have BC lol. :)
sigcomp.png 
If I have replied to a topic and you reply and I haven't gotten back to you within 48 hours (2 days) then send me a P.M.
Some important links: BC Forum Rules | Misplaced Malware Logs | BC Tutorials | BC Downloads |
Follow BleepingComputer on: Facebook! | Twitter! | Google+| Come join us on the BleepingComputer Live Chat on Discord too! |

#9 snemelk

snemelk

    inżynier


  • Malware Response Team
  • 1,468 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Poland
  • Local time:01:35 PM

Posted 16 November 2011 - 05:07 PM

1. Those that do it to anger a user and have nothing to gain for it

Quite rare, but yes - happens...

2. Those who do it for personal gain and to make money by stealing others info.

In many cases, that's not true... Nowadays, big money is involved in cybercrime - it's a well working "machine", and quite complex... Surprisingly, malware authors are often just one group (of many) involved in the scheme... I recommend reading for example this article: The botnet ecosystem - it presents the Suppliers of cybercriminal services and Customers - everything has its price...

3. I know I said two but then there are those that do it for research and testing.

Hmmm, Script kiddies making rogues for fame and not profit ...
Posted Image
snemelk.hekko.pl - my site with a few computer security tips...
Silesia - that's where I live!

"If I had some duct tape, I could fix that." - MacGyver


#10 Winterland

Winterland

  • Members
  • 980 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:The Land of Enchantment
  • Local time:05:35 AM

Posted 18 November 2011 - 05:56 AM

snemelk, thanks for the links.

Like Betrayal, I'm often asked by folks that I'm helping, 'why does this happen?' or 'who is doing this?', so it's helpful to explain and also to help myself understand the dynamics behind it all.


computerxpds - that was classic, simply classic.


Onward,

Winterland

Photobucket removed my cool flag - idiots!

 

Every calculation based on experience elsewhere fails in New Mexico.


#11 Nawtheasta

Nawtheasta

  • Members
  • 399 posts
  • OFFLINE
  •  
  • Location:New England, USA
  • Local time:07:35 AM

Posted 21 November 2011 - 12:15 AM

Hmm..I think there are several categories.

The evil genius that does it for fun.If something is written that is not motivated by payment
the chance of finding the individual will depend on how sloppy they get. A computer wiz may be smart with code but this may not translate to the criminal act of infecting others.

The profiteer.
The weak link for this type is the money transfer. Every bank has records of where money is transferred. Just follow the money.If a government agency was serious about doing this at some point you get to where a bank does not want to divulge transfer info. That bank should be banned from international commerce. This should be relatively easy but I have a feeling politics comes into play.

Governments
I would bet a lot of viruses are test runs for cyber-warfare. Just put something out there and see how it gets dealt with then patch the weak spots.Now you have a weapon on the shelf. Of course it would have a limited life span as programs and systems evolve necessitating a constant evolution and retesting.
I have wondered occasionally if there may be a doomsday virus of some sort out there that could basically kill every computer on the web.

Just my thoughts
Best Regards
Nawtheasta

#12 Drovers Dog

Drovers Dog

  • Members
  • 1,048 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Brisbane, Australia
  • Local time:09:35 PM

Posted 21 November 2011 - 08:21 AM

:hysterical: :hysterical: :hysterical:

Did you forget about that terrible Doomsday Virus that simply didn't do what everyone thought it would?

It was supposed to happen in the first minute of 2000.

Ray.
What ever you give to others, you will get back doubled, Just make sure you only give Nice Things?......DD saying

There is a saying, "You just can't make a silk purse out of a sow's ear" it means "to be happy with what you have and not look for the impossible"......DD saying

The "Spirit" of the people who died, on that terrible day 9/11 will NEVER REST until such time as the "Imbeciles" that caused it, are eliminated through out the World.....DD saying

What is a Dog?

#13 4dude

4dude

  • Members
  • 578 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:06:35 AM

Posted 21 November 2011 - 08:25 AM

Hey, I've only ever written ONE thing that could be categorized as malware

Ah you naughty boy you Posted Image

Edited by 4dude, 21 November 2011 - 08:26 AM.


#14 Andrew

Andrew

    Bleepin' Night Watchman


  • Moderator
  • 8,257 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:Right behind you
  • Local time:04:35 AM

Posted 21 November 2011 - 01:26 PM

:hysterical: :hysterical: :hysterical:

Did you forget about that terrible Doomsday Virus that simply didn't do what everyone thought it would?

It was supposed to happen in the first minute of 2000.

Ray.

That was a bug, not a virus.

#15 snemelk

snemelk

    inżynier


  • Malware Response Team
  • 1,468 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Poland
  • Local time:01:35 PM

Posted 25 November 2011 - 04:00 PM

An article on BBC News Technology: Exposing Russia's murky trade in exploit hack packs

Fyodor Yarochkin, a security analyst at California-based Armorize Technologies, says the programmers who create the packs are simply filling a gap in the market.

"Criminals want exploit packs, so these people provide them," he says.

They are mostly professional programmers who previously had legitimate jobs with large companies, but who prefer to work for themselves and earn a little more money, he believes.

Some are also computer science students.

:ph34r:
Posted Image
snemelk.hekko.pl - my site with a few computer security tips...
Silesia - that's where I live!

"If I had some duct tape, I could fix that." - MacGyver





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users