Are cross-platform trojans becoming more common?

jluppino

It seems that I have been seeing more examples of cross-platform malware lately. This was something I though was rare until recently. What has changed? Why are they becoming more common?

Topic: Security
Answer this Question

Answers

2 total
dvarian
Vote Up (12)

Two main things come to mind.  First, like jimlynch said, the desktop/laptop market isn't dominated by PCs the way it used to be.  Now there are a much higher percentage of machines running Mac OS and probably Linux as well  than there was a few years ago.  This makes those non-Windows machines more tempting targets for malware writers, who want to get as much from their efforts as they can.  When only 5% of machines are running a particular OS, it did make a lot of sense to make as much effort as you would to go after 95% of machines.  Another thing is that cross platform use of Java makes it so the same attack vector can be used for multiple operating systems- a malicious Java applet.  Thanks, progress.  It makes sense to me that you would want to get the most bang for your buck whether you are writing legit code or malware.  

jimlynch
Vote Up (9)

It may have something to do with other platforms gaining in popularity. Windows isn't the only game in town. OS X, Linux, iOS and Android have millions of users too. So if you are going to make a trojan, it probably makes more sense (in a twisted way) to make it cross platform. The more machines it's on, the more of a base it has to work from.

Ask a question

Join Now or Sign In to ask a question.
Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
When online services lack privacy controls, you can roll your own using near military-grade encryption.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
In the wake of recent security breaches of medical databases, doctors can’t be too careful
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
With a Microsoft-mandated deadline a little more than two months away, computer makers are still selling PCs equipped with Windows 7 Home Premium.
Many businesses focus on record retention, but here's why one lawyer says "Destroy!"
With a single massive power burst, storage media that suddenly heads south, or interaction with a light-fingered ne'er-do-well, the technology your student depends on can vanish. Take these five tips to heart, however, and the loss of a device or data need not be catastrophic.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.

White Papers & Webcasts

Webcast On Demand

Cloud BI Overview: Jaspersoft for AWS

Sponsor: TIBCO Jaspersoft

Webcast On Demand

Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.

Sponsor: TIBCO Jaspersoft

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness