Financially motivated malware thrives

Expect more spam, botnets in final months of 2007

Financially motivated malware attacks are on the rise, with automated software packages making it easy for unskilled hackers to earn a living by sending out spam, researchers at messaging security vendor Secure Computing say.

A malware kit called MPack, released by Russian hackers last December, allows pretty much anyone with US$200 to become a master spammer because it is easy to use and exploits vulnerabilities in FireFox, Internet Explorer and Apple's QuickTime, says Dmitri Alperovitch, principal research scientist for Secure Computing.

The trend that "kind of defines 2007" is the convergence of traditional e-mail with Web-based attacks, in which message recipients are prompted to click on links to malicious Web sites, rather than to download attachments, Alperovitch says.

"Certainly, exploiting Web browser vulnerabilities has been common. We've seen that for a long time," he says. "Now we're seeing that capability being merged with traditional e-mail worms that sort of blanket the Internet."

Information-stealing malware now accounts for 10 percent of all threats, up from 8 percent in January, new research from Secure Computing has found. Trojans comprise 63 percent of all newly discovered malware, up from 58 percent in January.

Spyware and phishing are also becoming more problematic as attackers use more targeted attacks to steal personal and financial information. "The barriers to entry into cyber crime have been lowered so much," Alperovitch says. "People are realizing that they can make very serious money with almost no accountability, almost complete anonymity."

Quoting the analyst firm Gartner, Secure Computing's researchers say that 75 percent of enterprises will be infected by "undetectable professional-grade malware" by year-end.

About 90 percent of all e-mail is malicious, but that figure will rise as the holiday season gets closer, according to Alperovitch.

"There's a good chance we'll reach 95 percent, maybe higher, of all e-mails being malicious by the end of the year," he says.

As the storm worm showed, the automation of online attacks is allowing the creation of more botnets, he says. E-mail delivery mechanisms are also being optimized to bypass spam filters. Unfortunately, many Web surfers are far too trusting.

"If you're walking down the street and someone asks you for your Social Security number or your bank account pin, you're not going to give it to them," Alperovitch says. "Yet on the Internet, people freely give them out to anyone who sends them an e-mail message."

Here are some key security trends and events identified by Secure Computing in the first eight months of 2007:

  • The storm worm, named after subject lines like "230 dead as storm batters Europe," and similar worms became widespread in January and the following months, with new variants being created every 15 minutes.
  • A password-stealing Trojan hit visitors to the Miami Dolphins' stadium Web site during the Super Bowl, when attackers took advantage of a vulnerability in Internet Explorer's rendering of vector markup language documents.
  • A mass-email with pictures of Britney Spears and Paris Hilton in April lured people to a Web site that hosted a zero-day exploit related to Windows' handling of animated cursor files. Microsoft released a patch to fix the vulnerability.
  • More than 10,000 European Web sites hosted malware attacks in June after being compromised. "Hidden IFRAME's" were injected into the Web sites, referring visitors to malicious sites using MPack to deliver banking Trojans.
  • So-called backdoor Trojans affect home users around the world, including nearly 100,000 PCs now infected by a new wave of storm malware. "The mailings that came with subject lines such as 'You've received a postcard from a family member!' directed users to Web-hosted exploits for several different vulnerabilities; they infect users' computers and attach them to the Storm family's P2P botnet," Secure Computing writes.

FILL IN THE SURVEY - AND YOU COULD BE A WINNER: ARN wants to hear from YOU. Tell us how you run a successful business and you could win an adrenaline-fuelled adventure of your choice. COMPLETE THE ARN SURVEY.

More about AppleGartnerMicrosoftSecure Computing

ARN Directory | Distributors relevant to this article

Comments

Comments are now closed

 

Latest News

06:00PM
Telstra launches communications initiatives for disabled Australians
05:04PM
Australian Information Industry Association backs changes to ESOP
04:48PM
Blackline appoints APAC GM to lead ambitious growth plan
04:06PM
Fletcher lays down NBN strategy to address communications "equity"
More News
17 Sep
NetSuite: The ROI of Cloud Computing for VARs
17 Sep
SAP HR Connect
18 Sep
How the shift to subscription-based licensing is introducing new risks that ever...
18 Sep
National Data Centre Roadshow - Canberra
View all events