What are Downloaders:
Normal-looking programs designed to fetch and install malware without raising any security alarms. In effect, what downloaders allow attackers to do is to get a “man on the inside” before committing to a full attack (it’s no coincidence they’re typically called “trojan programs”). Once a downloader creeps its way into a victim’s system, it can scope out the security settings, then smuggle other dangerous malware in after it’s established the cost is precise. Even after an attack is discovered and the other malware has been removed, as long as the downloader is still there hiding away, it can grab more malware and start the process all over again.
What makes protection a challenge:
Downloaders are one step removed from the actual dirty work involved in executing an attack. That means they don’t have to pack the same kind of functionality that might get other malware blocked. Instead, malware makers can focus solely on designing downloaders to be extremely good at avoiding detection. Think of it as attackers choosing to have a team made up skilled specialists rather than mediocre generalists. The downloader is a prolific passer, and the malware it downloads is a sensational scorer. With both of them able to focus on their respective specialty, they’re able to be much more effective when paired together.
Want to discuss it further, contact us today!
COMMON SECURITY THREATS SERIES:
Learn about other security threats you might be up against: