Hackers are taking a page from the open-source playbook, using the same techniques that made Linux and Apache successes to improve their malicious software, according to McAfee.Nowhere is this more apparent than within the growing families of “bot” software, which allow hackers to remotely control infected computers. Unlike viruses of the past, bots tend to be written by a group of authors, who often collaborate by using the same tools and techniques as open-source developers, said Dave Marcus, security research and communications manager with McAfee’s Avert Labs.“Over the last year and a half, we’ve noticed how bot development in particular has latched onto open-source tools and the open-source development model,” he said.The current generation of bot software has grown to the point where open-source software development tools make a natural fit. With hundreds of source files now being managed, developers of the Agobot family of malware, for example, are using the open-source Concurrent Versions System (CVS) software to manage their project. McAfee researchers have described this use of open-source techniques in a new magazine set to be unveiled Monday. Called “Sage,” the publication features a cover story titled “Paying a price for the open-source advantage” in its inaugural issue. McAfee plans to publish Sage every six months, Marcus said.Marcus said his company is drawing attention to the open-source trend in order to educate users, and not as an attempt to discredit open-source alternatives to its own proprietary software products. “We think [open-source antivirus products] are fine. They’ve never been something that was really in the same class as ours, but we’ve always been big supporters of open-source antivirus,” he said. However, Marcus did take issue with security researchers who distribute samples of malicious software, a practice known as full disclosure.“We’re not taking aim at the open-source movement; we’re talking about the full-disclosure model and how that effectively serves malware development,” he said.Marcus’s opinion was not well-received by one security professional.Full disclosure serves legitimate researchers and helps users by making vendors more responsive, said Stefano Zanero, chief technology officer with Secure Network SRL. “I drive an A-class Mercedes,” he said. “And I feel much safer since [a] car magazine revealed that the original design of the A-class was flawed,” he wrote via instant message.“Research works on disclosure, not on secrets,” Zanero added.-Robert McMillan, IDG News Service (San Francisco Bureau) Keep checking in at our Security Feed for updated news coverage. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe