Hoy en día es más que evidente que tener un entorno seguro dentro de algo que puede ser tan personal como una Laptop donde las personas guardan fotos, passwords, etc… es crucial estar protegido, y bueno ni hablar de un entorno de negocio del tamaño que sea; y algo necesario es conocer al enemigo; es por eso que quiero compartirles este interesante estudio sobre el ciclo de vida del Malware.

Research Paper: Malware Development Lifecycle

In recent years malware has transcended its ‘not so humble’ beginnings to evolve in complexity to rival many decent sized software projects. This reflects the increased sophistication of the producers of the malicious content and is reflected in their methods of attack. This indicates an improvement in development methodologies that enables malware producers to improve their output, adding functionality and capabilities to achieve maximum gain. In this paper we track the evolution of certain families of malware as they have grown and diversified, adapting and improving to effectively accomplish their required results. Starting with the early variants we show how the malware has changed to meet the requirements of its producers, how the code is implemented to best fulfill those requirements, how the malware producers test their creations and finally how they deliver the final release to their involuntary users. From this we draw conclusions regarding the various stages of the malware development life cycle and ascertain how their development reflects the strategies employed to produce the malware and what could be expected in future.”



clip_image002 clip_image004 clip_image006 clip_image008