It seems the VX groups are all destined to die out slowly, viruses for fun, learning and definitely not profit are on the way out. Like many other things its become a commercial market.
The top infector this month being Adware for the first time ever, not a virus. 29A is one of the old skool groups that has been around for a long time, they have quite some accolades for ‘firsts’ in virus development.
29A, hexadecimal for 666, is an underground VXer collective known for creating the first Win 2000 virus, the first 64bit virus, and early examples of mobile malware that infected devices such as PDAs.
The group also published information on how to create viruses through an irregular magazine, seven editions of which were republished on its website. The magazine contained examples of virus source code and tutorials on how to write malware.
The group has been in decline since its heyday at the turn of the century. A steady exodus of members over recent years accelerated early this year as it emerged that GriYo, Vecna, and Z0MBiE left the collective.
I guess within 5-10 years most hacking and VX groups will die out as the business gets taken over by people doing it for purely commercial reasons, accelerating development to make more money from infecting people with simplistic variants of proven strains of worms and trojans.
As previously reported, other less well known VXer groups are dying the death, a development symptomatic of changes in the malware market. Profit has replaced mischief, intellectual curiosity, or a desire to make a name for yourself as the motive for creating malware.
Traditional virus writers have drifted away from the scene to be replaced by more shadowy coders creating sophisticated Trojans aimed at turning an illicit profit. Enforcement action against virus writers has acted as a further disincentive for hobbyists, at least.
Instead of getting proof of concept malware from the likes of 29A, we’re dealing with the Storm Worm Trojan and other sophisticated “professionally developed” botnet clients.
The interesting malware is likely to die out, proof of concept and doing things because they are difficult are not very profitable. The control channels and bots are likely to get more sophisticated, but the infectors will remain based around social engineering and hiding from AV signatures.
Source: The Register
- DAMM – Differential Analysis of Malware in Memory
- FBI Recommends Crypto Ransomware Victims Just Pay
- Fitbit Vulnerability Means Your Tracker Could Spread Malware
- Israeli Hackers Join the War Against Palestinian Sites
- Rock Phish Group Accounts for 50% of Online Scams?
- Scammers Using Asterisk VoIP Systems to Make Calls
Most Read in Malware:
- Nasty Trojan Zeus Evades Antivirus Software - 77,429 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,540 views
- US considers banning DRM rootkits – Sony BMG - 44,959 views