Single-level malicious code will become more and more popular

According to F-Secure security researchers, the tendency to use kernel-level malware will become more and more popular among cyber criminals.

Kimmo Kasslin - a security researcher from F-Secure - said that this would be an incurable threat.

Unlike traditional malware types that only function as a normal application software, kernel-level malware exists and operates deep within the operating system core - the part responsible link between software and hardware.

" This type of malicious software operates at the priority level and shares the same resources as an independent operating system. Their goal is to take down all system protection solutions ," said Kasslin. know.

F-Secure researchers say this trend will inevitably lead to a new "arms race" between security software and kernel-level malware.

Picture 1 of Single-level malicious code will become more and more popular The goal of the race is that the source code can operate at the deepest level in the system. The closer you are to the most basic functions of the operating system, the more effective it is.

" This is something that no security firm has yet to do. Meanwhile, there have been a lot of source code with full functionality and capabilities as a kernel-level malicious code ."

Since 2005 the number of human-level malware is constantly increasing. On average each month in 2006 there were 2.63 new kernel-level malware appearing.

Most existing kernel-level malware works thanks to rootkits. This is a tool that allows to hide traditional malware to avoid the "surveillance eye" of security software.

" Meanwhile, information about building malware at the kernel level, how to rootkit applications, ways to bypass personal firewalls, how to create backdoor . appears rife on the Internet. " .

Human-level malware began to attract the attention of the community after Microsoft announced PatchGuard protection solution that will be integrated into the Vista operating system. This is a solution that completely locks the operating system kernel.

Security experts believe that it will not be long before the security solution is broken by hackers and security firms will re-enter to protect users.