Researchers from the University of Waterloo, Canada have created a software-based tool to identify malware that may have been released online in the aftermath of the 2016 attacks on Sony Pictures.
The tool, called Malwarebytes Anti-Virus Free, is available as an add-on for Mac and Linux.
“Malwarebytes is an anti-malware software suite for Mac OS X that is used by millions of people,” said the lead researcher of the study, Peter Boulanger.
“It is one of the most popular free anti-viruses on the market.”
MalwareBytes is the first of its kind to be developed specifically for Mac.
MalwareBit is another popular free antivirus tool.
They were developed by the University and the UK’s University of Exeter, but it is still not widely available.
The team, which included researchers from the School of Computer Science, worked on the software for a year and developed the tool with the help of researchers from Microsoft, Intel, the University’s Institute of Information Systems and Security, the UK Department of Health and Social Care and Microsoft.
“Our aim was to find the most effective anti-Malware software on Mac OS, so that our users would be able to defend themselves against these malicious attacks,” Boulager said.
The researchers found that a third of malware attacks they analyzed were still actively being executed on the infected machines.
“In some cases, the malicious software itself was still being used in order to spread its code to others,” the study said.
Malicious software that has been used to spread malware The team found that 64 percent of the malware that was detected in the analysis had been previously used to attack people or organizations.
This was consistent with other studies that have shown that the use of malware to spread itself online is not new.
“As soon as the infection has started, the infected computer can be exploited to carry out additional attacks, such as phishing or spamming,” the report said.
“These attacks are carried out with the aim of gaining access to sensitive data or to the operating system itself.”
The malware that is currently being used to distribute the malware is not particularly sophisticated, Boulangers said, and is being used by only a few people or small groups.
“We found that most of the malicious code was written in a very simple way, so the average person would be unable to detect it, which is why it is so hard to catch.”
The researchers said that they were surprised that this type of malware has not been identified before.
“This is an exciting new discovery, and shows that we are seeing a new era in which malware is being created in the background and spreading without detection,” the researchers said.
They are working on a new version of MalwareBucket, which would allow the use in more ways than just malware discovery.
“The new version will provide better detection for different kinds of malicious activity, like spamming or phishing campaigns,” the authors wrote.
“A new generation Anti-Malicious Software will be available soon.”
This article was updated on October 22, 2017, to correct the spelling of “Boulanger” in the headline.