Search This Blog

Powered by Blogger.

Blog Archive

Labels

Japan's Search and Destroy Computer Virus : Endhiran film Style

Computer Virus Against Cyber Attack
Japan Govt developing a "Search and Destroy" computer virus capable of tracking, identifying and disabling sources of cyber-attacks. Fujitsu reportedly is working on the cyberweapon for Japan's Defense Ministry under a 178.5 million yen ($2.32 million) project initiated in fiscal 2008 by the ministry's Technical Research and Development Institute.


According to the yomiur's report , the program can identify the source of a cyber-attack to a high degree of accuracy for distributed denial of service (DDoS) attacks, as well as some attacks aimed at stealing information stored in target computers. In DDoS attacks, hackers send target websites enormous volumes of data, eventually forcing them to shut down.

CyberWeapon is developed for  defense only, however, Security experts fear the implications of such a tool falling into the wrong hands.


Endhiran Style:  In Endhiran film, hero develop a robot to help military that can search and destroy the bombs ,also enemies.   Unfortunately, in the middle of the film, the robot hacked by villan and turned to be malicious robot, it will destroy the city.

Likewise, BlackHat hackers can get this CyberDefense tool and modify it for malicious uses.

"Even a 'good' virus uses system resources such as disk space, memory and CPU time. On a critical system a 'good' virus could cause unexpected side effects." Sophos Security Researcher said.

"A "good" virus may trigger false positives from security software, costing time and money as IT departments respond to the alerts. " he added.

Rik Ferguson, a researcher for the security firm Trend Micro, said launching a virus designed to hunt down an attack could, in effect, have the exact opposite effect.

"If it's designed to spread autonomously, then system owners will have no opportunity to test whether its supposedly altruistic activities will have any negative impact on a running system," Ferguson wrote. "It will also consume bandwidth, disk space, memory and processor cycles, all adding to the load, just as a malicious worm does effectively creating a Denial of Service condition."

"Finally," he added, "it really wouldn't take much effort for criminal groups to take these white-hat tools and modify them for more malicious use, blurring the line even more between the 'good' and the bad and putting professional grade carrier mechanisms in the hands of criminals."
Share it:

Malware Report

Virus Attack