Why Can Old School Malware Still Be Considered To Be A Threat?

In the world of computers, the latest and greatest technology is usually considered the best technology.

We are always looking for new updates and brand new features.

Once we have them on our system we feel that the product is improved in some way.

old malware still poses a threat

Most of the time, that is the case but every now and then that update may hurt a system more than it helps it.

You might have had an old feature that you loved but the company decided that it might be better if it was done another way.

This can really throw off your workflow.

In the world of online crime sometimes old technology can benefit the criminals since people, including security researchers, forget about it.

The old threat can be used to infect peoples computers and no one is any the wiser.

Old Botnets

Trend Micro is reporting that this is the case with an old botnet that is called SDBOT.

This Botnet has seen a rise in activity lately since it has been proven to still be effective at delivering malware to unsuspecting users.

The Botnet runs on the IRC protocol.

This protocol was considered the main one to use with old school botnets but has recently been set aside in favor of peer to peer and http methods of delivery.

Since security researchers are more on the look out for the newer technology, a smart hacker group out there decided to call, what they call in American Football, an audible.

They changed the method of delivery up and decided to go with an old school system.

Malware For Rent

The owners of the Botnet are allowing other trojan and virus writers to rent out their system to deliver the malware.

The main pieces of malware that have been delivered so far has been the koobface worm, the autorun worm, and fake antivirus software.

The number of other malware that is being delivered over this botnet can be very high since they are renting the space out to third party attackers.

The ones listed are the few that we know about.

You can avoid being attack by this botnet, by doing the things that you normally should do throughout the computing day –

Avoid clicking unknown links and accepting unknown attachments in your email.

This Botnet seems to have a favorite attack vector.

It likes to use fake Instant Message links to get people to click on their corrupted software pages.

This has proven to be very effective in attacking people and must be stressed by security vendors of how dangerous it truly is.

Computer users, as well as security professionals, must not forget that old technology can still turn around and hurt them in the end.

We all must be aware of all kinds of threats and not just the newer ones.

This is why it is so important that people update their computers as well as the software on it.

It can come back to haunt you if you don’t.

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.


  1. […] malware in question is very profitable and is very easy to […]

  2. […] are certain exploits out there that try to replace your normal .sys file with a corrupted version of their own […]

  3. […] have been security alerts of flash based advertisements loading spyware and viruses on a users system without their […]

Speak Your Mind