Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Researchers Report Massive Increase in Boot Time Malware

Symantec researchers report a massive increase in the amount of boot time malware striking users

Symantec researchers report a massive increase in the amount of boot time malware striking users

In the August 2011 Symantec Intelligence Report, the company noted there have already been as many new boot time malware threats detected in the first seven months of 2011 as there were in the previous three years. Also known as MBR (master boot record) threats, the malware infects an area of the hard disk that makes them one of the first things to be read and executed when a computer is turned on. This enables the threats to effectively dodge many security defenses.

In June, Microsoft warned Windows users about a bootkit Trojan known as Popureb, touching off discussions about whether or not infected users were better off completely re-installing Windows.

“MBR infections offer great scope for deep infection and control of computers, which makes the idea attractive to malware creators,” said Paul Wood, senior intelligence analyst,, in a statement. “Contemporary MBR infection methods are a fairly complex affair usually executed by highly skilled individuals.”

How Master Boot Record Malware Works

Infecting the MBR is not a new technique per se; many of the old boot sector viruses from over a decade ago did something similar, the report notes. The difference is modern MBR malware do so much more than just infecting the MBR. It certainly looks as if MBR malware is making a comeback in 2011.

The report also noted some other movement in the malware world. According to Symantec, the most frequently blocked malware for the past month was W32.Ramnit!html, a generic detection for .HTML files infected by W32.Ramnit(1). Ramnit spreads through removable drives and by infecting executable files such as .DLL, .EXE and .HTM extensions. Variants of the worm accounted for 15.8 percent of all malicious software blocked by Symantec endpoint protection technology in August.

While the overall ratio of spam in global email traffic dropped 1.9 percentage points to 75.9 percent between July and August, the ratio of email-borne viruses increased .14 percent. According to the report, spammers are still using to a tried-and-true operation known as a “pump-and-dump” stock scam. Such scams, Symantec explained, can artificially drive up the price of stock to allow the scammers to sell their shares for high profits.

“Scammers can make substantial profits in a matter of days with a well-executed pump-and-dump spam,” Wood said. “In the current turbulent environment many people may be convinced to invest in stocks that the scammers claim will benefit from the market turbulence.”

The full August 2011 Symantec Intelligence Report is available here.

Suggested Reading: Attacks on Mobile and Embedded Systems: Current Trends

Suggested Reading: Vulnerability Management Buyer’s Checklist: Key Questions to Ask

Written By

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.

Malware & Threats

A GitHub Codespaces feature meant to help with code development and collaboration can be abused for malware delivery.