Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    Sophos: Simple Malware Attacks Are Still Dangerous

    By
    Matt Hines
    -
    November 8, 2006
    Share
    Facebook
    Twitter
    Linkedin

      While cyber-criminals are becoming more organized in order to monetize their malware and online fraud efforts, researchers contend that technologically simple attacks remain just as effective for stealing information as newer, more sophisticated programs.

      Criminals continue to steal millions of forms of identification using phishing schemes and spyware programs, and there is little evidence to suggest that the attackers need to adopt more advanced programming techniques to continue to carry out their work, according to Mark Harris, global director of SophosLabs, the researching arm of anti-virus specialist company Sophos, based in Abingdon, England.

      Security experts have decried the creation of increasingly complex malware attacks, such as so-called polymorphic viruses that can change their signatures with each new infection to go undetected and continue to spread on their own. However, most personal information continues to be stolen using variants of well-known spyware and Trojan attacks.

      Security software makers and internal IT departments are well-versed in finding and blocking such attacks, but the sheer volume of malware threats combined with continued lack of discretion on the part of users is allowing comparatively crude programs to continue to reap rewards for criminals, according to SophosLabs latest research.

      /zimages/6/28571.gifA study says Symantec software does the best job of removing rootkits. Click here to read more.

      Since enterprises are being slammed with so many threats, attackers can manipulate their programs very minimally and find a way to fly under the radar, Harris said. The fact that most attacks also propagate themselves or serve as a front door to other malware programs remains another significant obstacle to progress, he said.

      “The sheer volume and frequency with which threats are changing, and the integrated, cascading nature of malware will keep things going strong,” Harris said. “The code writers are changing their techniques slightly every few hours, changing their domains once or twice a day, and that is enough to keep the stolen identities coming in. Malware is becoming like the spam problem in that the attacks are moving across a number of different sites very quickly, making them harder to stop even when you know what they are.”

      Some experts maintain that there are large numbers of organized groups selling and distributing malware code for a profit and to aid their own criminal efforts, but Harris said that picture may be giving hackers too much credit. There may be a handful of groups such as the people behind the WebAttacker spyware kit, which sells for $20 and includes tools that allow someone using the program to measure its efficacy in infecting machines, along with a “customer support” program and software updates, but it is unlikely that many such organizations exist, Sophos contends.

      The majority of attacks are coming from people who are simply re-using old threats that still work, and only a few truly organized malware shops likely exist today, Harris said. One of the primary ideas behind that argument is the notion that criminals still have so much success using basic programs that can be acquired for free that there is no need to upgrade.

      “There are some instances of smart people, and its unclear how much of the older malware is being sold, versus how much is simply reused, but the vast volume of malware is low-tech,” Harris said. “Its fairly straightforward to create the attacks with the free tools that are available, even a fairly targeted banking Trojan, so why try to build anything more complex when the old stuff still works?”

      The truly organized element of the malware industry is in the business of taking advantage of the stolen information. For the most part identity thieves are looking to sell their looted data to someone else relatively cheaply, because very few have the ability to turn using the data into a profitable criminal enterprise, Harris said.

      Harris said the fact that most attacks are generated by smaller groups and individual code writers may make it easier for security software makers to isolate and defeat the threats, but it does not make it any more likely that researchers, businesses and law enforcement officials will be able to track down the criminals responsible for creating the malware.

      /zimages/6/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      While law enforcement agencies struggle to find the budget to fight online crimes and communicate more effectively amongst themselves, users such as banks, which are the target of many of todays threats, remain more concerned with long-running security issues such as traditional credit card fraud schemes, Harris said. The lack of a clear leader in fighting the problem is making it even harder to create the atmosphere that will be needed to bring malware writers to justice, he said.

      And even when law enforcement groups can be convinced to hunt down the IT attackers, there will be always be someone new getting into the business as long as malware programs, especially low-tech threats, continue to dupe so many PC users, Harris said.

      “There will need to be large numbers of people affected by a major attack for law enforcement to even take notice, and once someone is investigated in the United States, they can easily move their operations overseas,” Harris said. “Its essentially the same problem as controlling drugs; maybe there are only a few large cartels who are at the top of the food chain, but once you eliminate one, another takes its place. As long as malware is profitable, Im not sure that there is anything that [security] vendors or law enforcement agencies can do to stop it.”

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×