Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › News › Your Antivirus Software Can’t Detect this New ‘Invisible Malware’

    Your Antivirus Software Can’t Detect this New ‘Invisible Malware’

    By Subham KapisweApril 29, 2019
    Facebook Twitter Reddit LinkedIn
    invisible malware

    Every time an antivirus software detects and quarantine a new malware, it’s like a success for the developers, company and end users. Though the companies always strive to upgrade their Antivirus to cope with the advanced threats, it seems the malware writers are having an edge these days.

    Today, I would like to talk about a new ‘Invisible malware’ which is impossible to catch by the currently available security software. This malware is so advanced that sometimes it resides only in the memory which means there’s no suspicious file on your disk to be scanned by the antivirus software.

    Read: Microsoft Edge File Permissions Conflicts with IE, Allows XXE Attacks

    How ‘Invisible Malware’ Works?

    Besides only residing in the memory, sometimes the invisible malware also found in the BIOS (Basic Input/Output System) and can affect your system without being tracked by any malware protection software.

    Not only this, the malware is even capable of disguising users as it’s a firmware update and ultimately replaces their existing firmware update, making it extremely difficult to revert the changes.

    “This ‘fileless malware’ that operates stealthily inside your system memory can only be removed by forcibly shutting down your computer,” said Alissa Knight of cybersecurity department, Aite Group.

    Also Read: What’s the Difference Between Viruses and Malware?

    Blue Pill Malware and More

    When your system is affected with such malware, it’s known as a ‘Blue Pill malware‘, which is a virtual rootkit that automatically loads itself into the virtual machine and after that, the operating system is loaded into the virtual machine. This also enables it to fake a shutdown and restart while letting the malware keep running. It also restricts you to use the shutdown choice in Microsoft Windows 10.

    As you might know, the rootkit always loads before the OS and thus creates a wonderful way for the malware. The Antivirus runs on the operating system and which is itself loading after the malware. Thus, it’s not possible for Antivirus software to detect such malware.

    It’s not like companies are not taking any action against these dangerous threats, but the thing is they will protect us in the future, what about today?

    Intel has partnered Lockheed Martin to work on a new series of processors capable of preventing such malware attacks. These processors are called “Intel Select Solution for Hardened Security,” which basically separates all the critical resources so that they can’t be infected by malware. They are also planning to take some major steps to lock down the BIOS and avoid attacks.

    However, if companies want to avoid such attacks in the current time, they need to shift their critical resources to the cloud.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Subham Kapiswe
    • LinkedIn

    A computer science engineer by education and blogger by profession who loves to write about Programming, Cybersecurity, Blockchain, Artificial Intelligence, Open Source and other latest technologies.

    Related Posts

    NVIDIA GeForce NOW is Finally Coming to India

    January 8, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.