Researchers have found many ways to hide malware in the storage format commonly used until recently was the antivirus program detected. Most anti-virus makers have patched their applications to find out what file formats storage was "harassed" Mr. Tomislav Pericin , founder of software projects protect commercial RLPack said.
He Perison presented at Black Hat security conference with security researchers independently Mario Vuksan and Managing Director (COO) of AccessData Brian Karney. Three researchers show how to tamper with storage format and put in nasty code, then executed on victim's PC.
Many companies use security products "gateway" to analyze whether there is an attachment file "single" no. Hackers have discovered that, sometimes the malicious compressed file can be "bypassed" many security products. After "sneak" into enterprise network, if end user can open attachment that permits hackers remote access to PC.
Most end users run antivirus software, so malicious software which implemented as Conficker discovered when it ran. But researchers have found at least eight holes and 30 potential security vulnerabilities other in safety products, security products that are not captured files bad news.
The researchers launched the open source tools, free NyxEngine can detect all malware and hidden content in the storage format. NyxEngine pretreatment storage format, breaks and check what's inside. It supports format. "Zip," ". Rar,." Gz "and". Cab. "